Understanding ddos attacks from mobile devices

P Farina, E Cambiaso, G Papaleo… - … Future Internet of Things …, 2015 - ieeexplore.ieee.org
… mobile devices, this paper introduces an innovative attack distribution system for performing
DDoS attacks … As a consequence, for example, if the bot has received an attack order with a …

Cyber-attack consequence prediction

P Datta, N Lodinger, AS Namin, KS Jones - arXiv preprint arXiv …, 2020 - arxiv.org
devices having … consequences of cyberattacks. The idea is to enable security researchers
to have tools at their disposal that makes it easier to communicate the attack consequences

Security and privacy in the internet of medical things: taxonomy and risk assessment

F Alsubaei, A Abuhussein… - 2017 IEEE 42nd …, 2017 - ieeexplore.ieee.org
… The taxonomy is updatable and can be expanded to comprehend new attacks, devices, and
services. … : Corrupted data affects data integrity and may lead to catastrophic consequences. …

[HTML][HTML] User experiences with simulated cyber-physical attacks on smart home IoT

NMA Huijts, A Haans, S Budimir, JRJ Fontaine… - Personal and Ubiquitous …, 2023 - Springer
… With the Internet of Things (IoT) becoming increasingly … -physical attack, ie a cyber-attack
with physical consequences. In … study to simulate cyber-attacks on smart home devices and to …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
… In this section, we will elaborate on several representative RA schemes that detect software
attacks according to the number of devices involved: single-prover attestation and swarm …

Cyber attacks on smart farming infrastructure

S Sontowski, M Gupta, SSL Chukkapalli… - 2020 IEEE 6th …, 2020 - ieeexplore.ieee.org
… sector to understand the consequences of cyber attacks and be … use of internet connected
devices in the farming ecosystem. … Sybil attacks and their defenses in the internet of things. …

Selective forwarding attack on iot home security kits

A Hariri, N Giannelos, B Arief - … City, Luxembourg, September 26–27, 2019 …, 2020 - Springer
… security of the Internet of Things (IoT) devices, but there remain some … -in-the-middle attack
between the device and the cloud and … Section 6 dissects the risks and consequences of the …

Vulnerability association evaluation of internet of thing devices based on attack graph

Y Ma, Y Wu, D Yu, L Ding… - International Journal of …, 2022 - journals.sagepub.com
… in the device and the correlation between devices. And according to the formula, the
attack success probability, attack consequences, and so on of vulnerability nodes in the …

[PDF][PDF] THREE TYPES OF ATTACK SIMULATION ON INTERNET OF THINGS DEVICES

M Emeç, MH Özcanhan - 2020 - researchgate.net
… These protocols enable communication and data transmission between devices with different
IoT structures. As a consequence, the monitoring of the protocol traffic is important for IoT …

[PDF][PDF] The Applicability of Various Cyber Security Services for the Prevention of Attacks on Smart Homes

VV Vegesna - International Journal of Current Engineering and …, 2021 - researchgate.net
… also have serious consequences if you also kept corporate information on your smart device.
… forms, ranging from simple devices that measure things like temperature to video cameras …