Section outline

  • IOT and Bigdata Security

    ·       Attack, Défense, and Network Robustness of Internet of Things

    ·       Malware Propagation and Control in Internet of Things

    ·       Privacy Preservation Data Dissemination

    ·       Trust and Trust Models for the IoT

    ·       Authentication in IoT

    ·       Computational Security for the IoT

    ·       Security Protocols for IoT Access Networks

             Security Testing