Review Article
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey
Figure 8
Existing security mechanisms for the protection of IoT applications [
42,
51,
105,
107,
109,
111,
112,
114,
115,
117ā
120,
122,
124,
216].