[图书][B] Internet of Things. IoT Infrastructures: Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I

B Mandler, J Marquez-Barja, MEM Campista… - 2016 - books.google.com
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-
conference proceedings of the Second International Internet of Things Summit, IoT 360° …

Security policy enforcement for networked smart objects

S Sicari, A Rizzardi, D Miorandi, C Cappiello… - Computer Networks, 2016 - Elsevier
Abstract In the Internet of Things (IoT) heterogeneous technologies concur to the
provisioning of customized services able to bridge the gap between the physical and digital …

Guidance Framework for Developing IoT-Enabled Systems' Cybersecurity

HA Abdulghani, A Collen, NA Nijdam - Sensors, 2023 - mdpi.com
Internet of Things (IoT) faces security concerns different from existing challenges in
conventional information systems connected through the Internet because of their limited …

[PDF][PDF] Security of internet of things for a reliable internet of services

A Arıs, SF Oktug, T Voigt - 2018 - library.oapen.org
The Internet of Things (IoT) consists of resource-constrained devices (eg, sensors and
actuators) which form low power and lossy networks to connect to the Internet. With billions …

Discussion on iot security recommendations against the state-of-the-art solutions

M Chmiel, M Korona, F Kozioł, K Szczypiorski… - Electronics, 2021 - mdpi.com
The Internet of Things (IoT) is an emerging concept comprising a wide ecosystem of
interconnected devices and services. These technologies collect, exchange and process …

A softwarized intrusion detection system for the RPL-based Internet of Things networks

G Violettas, G Simoglou, S Petridou… - Future Generation …, 2021 - Elsevier
Abstract Internet of Things (IoT) constitutes a pivotal contributor to the Industry 4.0 (I 4.0)
vision, technologically transforming production and societies. It enables novel services …

Deriving impact-driven security requirements and monitoring measures for industrial IoT

G Hansch, P Schneider, GS Brost - Proceedings of the 5th on cyber …, 2019 - dl.acm.org
The emerging Industrial Internet of Things (IIoT) is characterized by heterogeneous systems,
loose topologies, cross-company data flows, changing entities, and high cybersecurity …

[PDF][PDF] Research and innovation action for the security of the internet of things: The seriot project

J Domanska, E Gelenbe, T Czachorski… - Security in Computer …, 2018 - library.oapen.org
The Internet of Things (IoT) was born in the mid 2010's, when the threshold of connecting
more objects than people to the Internet, was crossed. Thus, attacks and threats on the …

Improving security of web servers in critical IoT systems through self-monitoring of vulnerabilities

L Song, M García-Valls - Sensors, 2022 - mdpi.com
IoT (Internet of Things) systems are complex ones that may comprise large numbers of
sensing and actuating devices; and servers that store data and further configure the …

[HTML][HTML] IoTSecSim: A framework for modelling and simulation of security in Internet of things

KO Chee, M Ge, G Bai, DD Kim - Computers & Security, 2024 - Elsevier
The proliferation of the Internet of Things (IoT) devices has provided attackers with
tremendous opportunities to launch various cyber-attacks. It has been challenging to …