The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.
How to cite (IEEE):
A. Janisar, K. Shafee bin Kalid, A. Sarlan, M. Iqbal, & M. Amir Khan
"Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets," JOIV : International Journal on Informatics Visualization, vol. 8, no. 3-2, , pp. 1827-1833, Nov. 2024.
https://doi.org/10.62527/joiv.8.3-2.3084
How to cite (APA):
Janisar, A., Shafee bin Kalid, K., Sarlan, A., Iqbal, M., & Amir Khan, M.
(2024).
Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets.
JOIV : International Journal on Informatics Visualization, 8(3-2), 1827-1833.
https://doi.org/10.62527/joiv.8.3-2.3084
How to cite (Chicago):
Janisar, Aftab Alam, Shafee bin Kalid, Khairul, Sarlan, Aliza Bt, Iqbal, M. Aqeel, AND Amir Khan, Muhammad.
"Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets" JOIV : International Journal on Informatics Visualization [Online], Volume 8 Number 3-2 (29 November 2024)
https://doi.org/10.62527/joiv.8.3-2.3084
How to cite (Vancouver):
Janisar A, Shafee bin Kalid K, Sarlan A, Iqbal M, & Amir Khan M .
Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets.
JOIV : International Journal on Informatics Visualization [Online]. 2024 Nov;
8(3-2):1827-1833.
https://doi.org/10.62527/joiv.8.3-2.3084
How to cite (Harvard):
Janisar, A., Shafee bin Kalid, K., Sarlan, A., Iqbal, M., & Amir Khan, M.
,2024.
Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets.
JOIV : International Journal on Informatics Visualization, [Online] 8(3-2), pp. 1827-1833.
https://doi.org/10.62527/joiv.8.3-2.3084
How to cite (MLA8):
Janisar, Aftab Alam, Khairul Shafee bin Kalid, Aliza Bt Sarlan, M. Aqeel Iqbal, & Muhammad Amir Khan.
"Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets." JOIV : International Journal on Informatics Visualization [Online], 8.3-2 (2024): 1827-1833. Web. 15 Jan. 2025
, https://doi.org/10.62527/joiv.8.3-2.3084
BibTex Citation Data :
@article{