Risk analysis in Internet of Things using EBIOS

BF Zahra, B Abdelhamid - 2017 IEEE 7th Annual Computing …, 2017 - ieeexplore.ieee.org
… And as the third step, the risk assessment which concern the identification and the
estimation of the scenarios that can cause the feared events, and thus compose risks. Then, …

A Study of Multi-viewpoint Risk Assessment of Internet of Things (IoT)

S Wangyal, T Dechen, S Tanimoto… - 2020 9th International …, 2020 - ieeexplore.ieee.org
… In this paper, we conducted a risk assessment of the Internet of Things to clarify the importance
of cyber and non-cyber risks when it comes to proper implementation of IoT systems. A …

Internet of Things: Risk Management

V Malik, S Singh - Smart Systems and IoT: Innovations in Computing …, 2020 - Springer
… This state of art will make a case for developing new risk assessment methodologies and
develop new ideas for exercising IoT opportunities by considering the heavy, big, dynamic, …

[HTML][HTML] Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge

P Radanliev, D De Roure, M Van Kleek, U Ani… - … Systems and Decisions, 2021 - Springer
… In the case study, we have selected the most prominent cyber risk assessment methods,
and we attempted to find commonalities interdependencies between different risk assessment

Operational risk assessment on Internet of things: Mitigating inherent vulnerabilities

Y Park, M Reith, B Mullins - ECCWS 2019 18th European …, 2019 - books.google.com
… factors based on the current methodologies of assessing security risks, and propose …
mitigate the risks discussed. We assert that an assessment of the operational risk in conjunction …

Security and privacy in the internet of medical things: taxonomy and risk assessment

F Alsubaei, A Abuhussein… - 2017 IEEE 42nd …, 2017 - ieeexplore.ieee.org
… In Section 2, we classify risks based on the IoT layers, intruder type, … a risk assessment
for IoMT. In Section 4, we discuss the use of the proposed taxonomy and risk assessment

Cyber-risks in the industrial internet of things (IIoT): towards a method for continuous assessment

C Adaros Boye, P Kearney, M Josephs - Information Security: 21st …, 2018 - Springer
… of risk are subject to many uncertainties, so it is important to review risk assessments and …
In conclusion, there is a lack of risk assessment methods for IoT that are both holistic and …

[PDF][PDF] An Early Cautionary Scan of the Security Risks of the Internet of Things

SS Gutlapalli - Asian Journal of Applied Science and Engineering, 2017 - researchgate.net
Risk assessment methods may focus on threats or critical assets. NIST … risk assessment
approaches are unreliable, hence periodic evaluation is necessary. Our IoT risk assessment

Assessing risks and modeling threats in the internet of things

P Griffioen, B Sinopoli - arXiv preprint arXiv:2110.07771, 2021 - arxiv.org
… We use this IoT attack taxonomy as the foundation for designing a joint risk assessment
and maturity assessment framework that is implemented as an interactive online tool. The …

Assessing risks and threats with layered approach to Internet of Things security

M Aydos, Y Vural, A Tekerek - Measurement and Control, 2019 - journals.sagepub.com
… integrated risk-based Internet of Things security approach for the Internet of Things vulnerabilities
… , it is aimed to minimize or prevent the impact of security attacks via risk assessments. …