A Survey of Analysis Methods for Security and Safety verification in IoT Systems. Abuserrieh, L. & Alalfi, M. H. CoRR, 2022.
Paper doi bibtex @article{DBLP:journals/corr/abs-2203-01464,
author = {Lobna Abuserrieh and
Manar H. Alalfi},
title = {A Survey of Analysis Methods for Security and Safety verification
in IoT Systems},
journal = {CoRR},
volume = {abs/2203.01464},
year = {2022},
url = {https://doi.org/10.48550/arXiv.2203.01464},
doi = {10.48550/ARXIV.2203.01464},
eprinttype = {arXiv},
eprint = {2203.01464},
timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2203-01464.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"W9r8k2rsQG8hna85f","bibbaseid":"abuserrieh-alalfi-asurveyofanalysismethodsforsecurityandsafetyverificationiniotsystems-2022","author_short":["Abuserrieh, L.","Alalfi, M. H."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Lobna"],"propositions":[],"lastnames":["Abuserrieh"],"suffixes":[]},{"firstnames":["Manar","H."],"propositions":[],"lastnames":["Alalfi"],"suffixes":[]}],"title":"A Survey of Analysis Methods for Security and Safety verification in IoT Systems","journal":"CoRR","volume":"abs/2203.01464","year":"2022","url":"https://doi.org/10.48550/arXiv.2203.01464","doi":"10.48550/ARXIV.2203.01464","eprinttype":"arXiv","eprint":"2203.01464","timestamp":"Wed, 16 Mar 2022 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/corr/abs-2203-01464.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-2203-01464,\n author = {Lobna Abuserrieh and\n Manar H. Alalfi},\n title = {A Survey of Analysis Methods for Security and Safety verification\n in IoT Systems},\n journal = {CoRR},\n volume = {abs/2203.01464},\n year = {2022},\n url = {https://doi.org/10.48550/arXiv.2203.01464},\n doi = {10.48550/ARXIV.2203.01464},\n eprinttype = {arXiv},\n eprint = {2203.01464},\n timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/corr/abs-2203-01464.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Abuserrieh, L.","Alalfi, M. H."],"key":"DBLP:journals/corr/abs-2203-01464","id":"DBLP:journals/corr/abs-2203-01464","bibbaseid":"abuserrieh-alalfi-asurveyofanalysismethodsforsecurityandsafetyverificationiniotsystems-2022","role":"author","urls":{"Paper":"https://doi.org/10.48550/arXiv.2203.01464"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/49/2794.bib","dataSources":["sruHQc7MdEddqHEe4"],"keywords":[],"search_terms":["survey","analysis","methods","security","safety","verification","iot","systems","abuserrieh","alalfi"],"title":"A Survey of Analysis Methods for Security and Safety verification in IoT Systems","year":2022}