Future Internet, Volume 12, Issue 2 (February 2020) – 23 articles
Cover Story (view full-size image): With the emergence and development of the Internet of Things (IoT), devices have been widely used at home and in industry and transportation. While IoT provides many valuable benefits, security vulnerabilities often occur in IoT devices, which create severe risks to users’ privacy and property. This article focuses on the core topic of vulnerability analysis technologies in the field of IoT security. It summarizes related research according to the life cycle of vulnerability analysis, including vulnerability discovery, detection, and mitigation. In the future, there will be more and more technologies combined with new fields to implement automated vulnerability analysis on large-scale and cross-architecture.View this paper.
- Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
- You may sign up for e-mail alerts to receive table of contents of newly released issues.
- PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.