FingerprintDive into the research topics of 'What's your protocol: Vulnerabilities and security threats related to Z-Wave protocol'. Together they form a unique fingerprint.
- Sort by
Kyounggon Kim, Kiyoon Cho, Jihwan Lim, Young Ho Jung, Min Seok Sung, Seong Beom Kim, Huy Kang Kim
Research output: Contribution to journal › Article › peer-review