Author:
Anjum Misbah,Kapur P. K.,Agarwal Vernika,Kumar Vivek
Publisher
Springer International Publishing
Reference31 articles.
1. Gourisetti SNG, Mylrea M, Patangia H (2019) Cybersecurity vulnerability mitigation framework through empirical paradigm (CyFEr): prioritized gap analysis. IEEE Syst J 14(2):1897–1908
2. Statista L. Internet of things (iot) connected devices installed base worldwide from 2015 to 2025 (in billions), Statista (2019). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide
3. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660
4. Kapur PK, Pham H, Gupta A, Jha PC (2011) Software reliability assessment with OR applications. Springer, London, p 364
5. Carnegie Mellon University, Security Vulnerabilities. https://www.sei.cmu.edu/our-work/security-vulnerabilities/index.cfm