What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11 Vulnerabilities of IoT Devices形式モデルVulnerability Assessment Method 2025.09.11 2025.09.13 Literature Database
Autoencoder-based Anomaly Detection in Smart Farming Ecosystem Authors: Mary Adkisson, Jeffrey C Kimmel, Maanak Gupta, Mahmoud Abdelsalam | Published: 2021-10-29 Vulnerabilities of IoT DevicesData Management SystemMachine Learning Application 2021.10.29 2025.05.28 Literature Database