Abstract
In this chapter, concluding remarks are given, and several research challenges and topics that aim at paving the way for future work in the area of IoT security are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Luigi Atzori, Antonio Iera, and Giacomo Morabito. From “Smart Objects” to “Social Objects”: The Next Evolutionary Step of the Internet of Things. IEEE Communications Magazine, 52(1):97–105, 2014.
Oscar Day and Taghi M Khoshgoftaar. A survey on heterogeneous transfer learning. Journal of Big Data, 4(1):29, 2017.
Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Z Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity. Contexiot: Towards providing contextual integrity to appified IoT platforms. In Proceedings of The Network and Distributed System Security Symposium, 2017.
Ponemon Institute LLC. 2017 study on mobile and iot application security. [Online]. Available: https://www.arxan.com/wp-content/uploads/2017/01/2017_Security_IoT_Mobile_Study.pdf.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bou-Harb, E., Neshenko, N. (2020). Concluding Remarks and Future Perspective. In: Cyber Threat Intelligence for the Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-45858-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-45858-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-45857-7
Online ISBN: 978-3-030-45858-4
eBook Packages: Computer ScienceComputer Science (R0)