D2.4 presents the current set of the baseline security requirements of the planned architecture. The document identifies the assets that need protection based on the high-level processes commonly found in IoT systems, as well as formulates and prioritizes threats to the identified assets. Threats are expressed as potential misuse cases,…

IoTACSeptember 1, 2021
Recent Comments