Security risk assessment in internet of things systems

JRC Nurse, S Creese, D De Roure - IT professional, 2017 - ieeexplore.ieee.org
… the case for new methodologies to assess risk in the context of the Internet of Things (IoT). …
’s dynamics and uniqueness while maintaining the rigor of best practice in risk assessment. …

A risk assessment methodology for the Internet of Things

S Sicari, A Rizzardi, D Miorandi… - Computer …, 2018 - Elsevier
… This section describes the risk assessment method adopted in our solution and integrated
into the IoT context. Such a mechanism has been proposed in [16] and measures the …

Threat modelling and risk assessment in internet of things: A review

M Mahak, Y Singh - Proceedings of Second International Conference on …, 2021 - Springer
… So, there is a need to organize the threat and reassess the riskrisk through various risk
assessment techniques. Here is a brief description of what threat modelling and risk assessment

[HTML][HTML] Future developments in cyber risk assessment for the internet of things

P Radanliev, DC De Roure, R Nicolescu, M Huth… - Computers in …, 2018 - Elsevier
… taxonomic classification of cyber risk assessment requirements. The … risk assessment
requirements into (1) risk identification assessment strategy; (2) risk estimation strategy; and (3) risk

A novel risk assessment model for privacy security in internet of things

T Wu, G Zhao - Wuhan University Journal of Natural Sciences, 2014 - Springer
… Abstract: Aiming at the issues of privacy security in Internet of Things (IoT) applications, we
propose an effective risk assessment model to handle probabilistic causality of evaluation …

A graph theory based generic risk assessment framework for internet of things (IoT)

VL Shivraj, MA Rajan… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
… frameworks do not effectively address all the risk assessment needs of IoT and hence there
… such risk assessment frameworks. To address these issues, a model-driven risk assessment

Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things

G George, SM Thampi - Pervasive and Mobile Computing, 2019 - Elsevier
… in the design of risk mitigation strategies. In this … risk assessment in the Vulnerability Graph
of a given IoT network. The process of risk assessment involves identification and assessment

Risk assessment and control of agricultural supply chains under Internet of Things

B Yan, X Wang, P Shi - Agrekon, 2017 - journals.co.za
… Based on these two points, the supply chain risk assessment model using the OWA operator
is employed by this study in the risk assessment stage of the supply chain. The fundamental …

A cyber-physical risk assessment approach for Internet of Things enabled transportation infrastructure

K Ntafloukas, DP McCrum, L Pasquale - Applied Sciences, 2022 - mdpi.com
… domain, risk assessment methods should be adapted to each sector (eg, maritime, transportation)
individually [41]. Thus, the cyber-physical risk assessment approach presented in this …

Risk assesment parameters for Internet of Things projects

VV Fireteanu - … 15th International Conference on Engineering of …, 2019 - ieeexplore.ieee.org
risk assessment algorithm will be useful for us to estimate the resources involved in an Internet
of Things … As a quick overview, this paper will present the risk algorithm parameters, how …