A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… Similarly, several studies have proposed lightweight mitigation techniques for version …
trust management techniques in the Internet of Things,” IEEE Internet Things J., vol. 6, no. 6, pp. …
trust management techniques in the Internet of Things,” IEEE Internet Things J., vol. 6, no. 6, pp. …
Autonomic schemes for threat mitigation in Internet of Things
QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
… Over the years, many researchers have proposed threat mitigation … More particularly, this
paper looks at threat mitigation … This article aims to discuss various threat mitigation approaches …
paper looks at threat mitigation … This article aims to discuss various threat mitigation approaches …
Routing attacks and mitigation methods for RPL-based Internet of Things
… mitigation techniques for RPL. In this survey, we will focus on the routing attacks on RPL and
their mitigation methods, whether these mitigation … RPL’s attacks mitigation methods. To our …
their mitigation methods, whether these mitigation … RPL’s attacks mitigation methods. To our …
Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques
… techniques. We propose a new architecture composed of two components: DoS/DDoS detection
and DoS/DDoS mitigation… In this way, it is possible to apply the corresponding mitigation …
and DoS/DDoS mitigation… In this way, it is possible to apply the corresponding mitigation …
[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention
… Internet of things playing a vital role in bridging this gap … on evolution, prevention and mitigation
of Ransomware in IoT … , Existing techniques to prevent and mitigate Ransomware attacks …
of Ransomware in IoT … , Existing techniques to prevent and mitigate Ransomware attacks …
Internet of Things: Evolution and technologies from a security perspective
… seeks to highlight IoT cyber security vulnerabilities and mitigation techniques to the reader.
… and mitigation techniques suggested. Technologies within IoT systems including Things, …
… and mitigation techniques suggested. Technologies within IoT systems including Things, …
Toward a distributed approach for detection and mitigation of denial-of-service attacks within industrial internet of things
V Borgiani, P Moratori, JF Kazienko… - … Internet of Things …, 2020 - ieeexplore.ieee.org
… mitigation times when compared to a previous centralized approach, so-called ConCReCT.
Our results indicate that DConCReCT may be applied in the mitigation … node traffic mitigation …
Our results indicate that DConCReCT may be applied in the mitigation … node traffic mitigation …
Risk and threat mitigation techniques in internet of things (IoT) environments: a survey
M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
… mitigation techniques applied across different IoT application contexts, and elaborates on
how to apply each mitigation technique, … in discussing mitigation techniques proposed for the …
how to apply each mitigation technique, … in discussing mitigation techniques proposed for the …
DDoS attack mitigation in Internet of Things using software defined networking
… In order to implement our idea, we discuss how to mitigate DDoS attacks using the features
… DDoS mitigation using SDN inter-domain information exchange. It is claimed that the Internet …
… DDoS mitigation using SDN inter-domain information exchange. It is claimed that the Internet …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
… Therefore, a detailed review of security attacks towards WSNs and IoT, along with the
techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In …
techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In …
相关搜索
- machine learning techniques internet of things
- secure routing internet of things
- mitigation methods internet of things
- industrial internet of things
- threat mitigation internet of things
- detection and mitigation internet of things
- practical internet of things
- internet of things frameworks
- ddos attack mitigation internet of things
- rpl based internet of things
- internet of things cybersecurity
- internet of things applications
- routing attacks mitigation techniques
- rpl routing protocol internet of things
- security requirements internet of things
- analysis and defenses internet of things