Review Article

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Figure 8

Existing security mechanisms for the protection of IoT applications [42, 51, 105, 107, 109, 111, 112, 114, 115, 117ā€“120, 122, 124, 216].