dc.contributor.author | Balbal, Samir | |
dc.date.accessioned | 2025-03-18T11:58:36Z | |
dc.date.available | 2025-03-18T11:58:36Z | |
dc.date.issued | 2024 | |
dc.identifier.uri | http://depot.umc.edu.dz/handle/123456789/14551 | |
dc.description.abstract | The expansion of the Internet of Things (IoT) has introduced transformative possibilities by connecting diverse devices, from small-scale sensors to complex systems. However, this connectivity also brings substantial security challenges due to the extensive network of devices transmitting sensitive information. Ensuring effective data protection and preventing unauthorized access are critical priorities. Addressing these concerns requires the strategic placement of security measures within IoT networks to safeguard both devices and data | fr_FR |
dc.title | Optimizing IoT Security Deployment Costs through Graph Theory Techniques | fr_FR |
dc.type | Article | fr_FR |