Securing IoT Infrastructures Using Honeypot-Based Intrusion Detection (IDS) and AES-256 Encryption: A Comprehensive Survey
Abstract
View Abstract & download full text of Securing IoT Infrastructures Using Honeypot-Based Intrusion Detection (IDS) and AES-256 Encryption: A Comprehensive Survey... --- Source: International Journal of Engineering Research & Technology - https://www.ijert.org/securing-iot-infrastructures-using-honeypot-based-intrusion-detection-ids-and-aes-256-encryption-a-comprehensive-survey-ijertv15is010573 PDF: https://www.ijert.org/securing-iot-infrastructures-using-honeypot-based-intrusion-detection-ids-and...
Description / Details
View Abstract & download full text of Securing IoT Infrastructures Using Honeypot-Based Intrusion Detection (IDS) and AES-256 Encryption: A Comprehensive Survey...
Source: International Journal of Engineering Research & Technology - https://www.ijert.org/securing-iot-infrastructures-using-honeypot-based-intrusion-detection-ids-and-aes-256-encryption-a-comprehensive-survey-ijertv15is010573 PDF: https://www.ijert.org/securing-iot-infrastructures-using-honeypot-based-intrusion-detection-ids-and-aes-256-encryption-a-comprehensive-survey-ijertv15is010573 Original Article: View on IJERT
Please sign in to join the discussion.
No comments yet. Be the first to share your thoughts!
Feb 3, 2026
Engineering Research
Engineering
0