Understanding ddos attacks from mobile devices
P Farina, E Cambiaso, G Papaleo… - … Future Internet of Things …, 2015 - ieeexplore.ieee.org
… mobile devices, this paper introduces an innovative attack distribution system for performing
DDoS attacks … As a consequence, for example, if the bot has received an attack order with a …
DDoS attacks … As a consequence, for example, if the bot has received an attack order with a …
Cyber-attack consequence prediction
… devices having … consequences of cyberattacks. The idea is to enable security researchers
to have tools at their disposal that makes it easier to communicate the attack consequences …
to have tools at their disposal that makes it easier to communicate the attack consequences …
Security and privacy in the internet of medical things: taxonomy and risk assessment
F Alsubaei, A Abuhussein… - 2017 IEEE 42nd …, 2017 - ieeexplore.ieee.org
… The taxonomy is updatable and can be expanded to comprehend new attacks, devices, and
services. … : Corrupted data affects data integrity and may lead to catastrophic consequences. …
services. … : Corrupted data affects data integrity and may lead to catastrophic consequences. …
[HTML][HTML] User experiences with simulated cyber-physical attacks on smart home IoT
… With the Internet of Things (IoT) becoming increasingly … -physical attack, ie a cyber-attack
with physical consequences. In … study to simulate cyber-attacks on smart home devices and to …
with physical consequences. In … study to simulate cyber-attacks on smart home devices and to …
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
… In this section, we will elaborate on several representative RA schemes that detect software
attacks according to the number of devices involved: single-prover attestation and swarm …
attacks according to the number of devices involved: single-prover attestation and swarm …
Cyber attacks on smart farming infrastructure
S Sontowski, M Gupta, SSL Chukkapalli… - 2020 IEEE 6th …, 2020 - ieeexplore.ieee.org
… sector to understand the consequences of cyber attacks and be … use of internet connected
devices in the farming ecosystem. … Sybil attacks and their defenses in the internet of things. …
devices in the farming ecosystem. … Sybil attacks and their defenses in the internet of things. …
Selective forwarding attack on iot home security kits
… security of the Internet of Things (IoT) devices, but there remain some … -in-the-middle attack
between the device and the cloud and … Section 6 dissects the risks and consequences of the …
between the device and the cloud and … Section 6 dissects the risks and consequences of the …
Vulnerability association evaluation of internet of thing devices based on attack graph
Y Ma, Y Wu, D Yu, L Ding… - International Journal of …, 2022 - journals.sagepub.com
… in the device and the correlation between devices. And according to the formula, the
attack success probability, attack consequences, and so on of vulnerability nodes in the …
attack success probability, attack consequences, and so on of vulnerability nodes in the …
[PDF][PDF] THREE TYPES OF ATTACK SIMULATION ON INTERNET OF THINGS DEVICES
M Emeç, MH Özcanhan - 2020 - researchgate.net
… These protocols enable communication and data transmission between devices with different
IoT structures. As a consequence, the monitoring of the protocol traffic is important for IoT …
IoT structures. As a consequence, the monitoring of the protocol traffic is important for IoT …
[PDF][PDF] The Applicability of Various Cyber Security Services for the Prevention of Attacks on Smart Homes
VV Vegesna - International Journal of Current Engineering and …, 2021 - researchgate.net
… also have serious consequences if you also kept corporate information on your smart device.
… forms, ranging from simple devices that measure things like temperature to video cameras …
… forms, ranging from simple devices that measure things like temperature to video cameras …