Cyber-attacks related to intelligent electronic devices and their countermeasures: A review
… If multiple correlative attacks are launched simultaneously, attackers may even cause … ,
whose consequences are often catastrophic. In this paper, a systematic review of cyber-attacks …
whose consequences are often catastrophic. In this paper, a systematic review of cyber-attacks …
A taxonomy of cyber-physical threats and impact in the smart home
… The adoption of Internet of Things technologies, cloud computing, artificial intelligence and
… Financial loss due to the cyber attack of IoT devices at home can be consequence of a …
… Financial loss due to the cyber attack of IoT devices at home can be consequence of a …
A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services
… To make things even worse, the interdependencies between … In the case of attacks based
on end-user IoT devices (not … attack may lead to very important consequences. A possible …
on end-user IoT devices (not … attack may lead to very important consequences. A possible …
Fear and logging in the internet of things
… , IoT attacks could have chilling safety consequences – burglars can now attack a smart …
access to devices (eg, Mirai attack [10]), but instead assumes device integrity. The assumption of …
access to devices (eg, Mirai attack [10]), but instead assumes device integrity. The assumption of …
[PDF][PDF] Internet of things and the man-in-the-middle attacks–security and economic risks
Z Cekerevac, Z Dvorak, L Prigoda, P Cekerevac - MEST Journal, 2017 - mest.meste.org
… This paper presents some aspects of the Internet of Things (IoT) and attacks to which IoT …
against attacks on the device. The consequences are numerous, and one of them is that an …
against attacks on the device. The consequences are numerous, and one of them is that an …
[PDF][PDF] A comprehensive IoT attacks survey based on a building-blocked reference model
HA Abdul-Ghani, D Konstantas… - International Journal of …, 2018 - academia.edu
… scale is a consequence of the Internet of Things (IoT)[1], [2]. … : Bluetooth devices are
vulnerable to many attacks, the most … of attack, an adversary could be inside the victims device by …
vulnerable to many attacks, the most … of attack, an adversary could be inside the victims device by …
Privacy and security in internet of things and wearable devices
… or an add-on affect the resulting device and the potential consequences to the user’s security
and … , thus enabling us to launch a wider variety of attacks against other connected devices. …
and … , thus enabling us to launch a wider variety of attacks against other connected devices. …
A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
… of implantable medical devices, body area networks, and Internet of Things technologies in
… the consequences of these threats. We present a detailed survey of different potential attacks …
… the consequences of these threats. We present a detailed survey of different potential attacks …
Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms
… The attacks discovered in this study create fake IoT devices … As a consequence, an attacker
can build a phantom device to … of SmartThings devices, and 18 kinds of TP-LINK devices. …
can build a phantom device to … of SmartThings devices, and 18 kinds of TP-LINK devices. …
Cyber attacks classification in IoT-based-healthcare infrastructure
A Djenna, DE Saïdouni - 2018 2nd Cyber Security in …, 2018 - ieeexplore.ieee.org
… Internet of Things has attracted a lot of attention in recent … any connected device has two
main consequences: one is to … Critical devices such as cardiology or radiology are therefore …
main consequences: one is to … Critical devices such as cardiology or radiology are therefore …