[PDF][PDF] IoT (Internet of Things)-based underground risk assessment system surrounding water pipes in Korea
JM Kang, IH Lee - Int. J. Control Autom, 2015 - scholar.archive.org
… 3 Underground assessment system surrounding water pipes Underground risk assessment
system surrounding water pipes predicts the occurrence of subsidence caused by the …
system surrounding water pipes predicts the occurrence of subsidence caused by the …
Internet of things: Hierarhy of smart systems
D Maevsky, A Bojko, E Maevskaya… - 2017 9th IEEE …, 2017 - ieeexplore.ieee.org
… However, this approach to the risk assessment is lately … seen especially clear in risk
assessment in heterogeneous systems… the main diagonal the own risk assessments are placed, …
assessment in heterogeneous systems… the main diagonal the own risk assessments are placed, …
[PDF][PDF] Resilience assessment of internet of things: A case study on smart buildings
RG Mock, L Lopez de Obeso, C Zipper… - Proceedings of the …, 2016 - researchgate.net
… However, a link to analyse risks and quantitative risk assessment is missing. The paper lays
… FMEA with common approaches in IT security risk assessment (Use Cases, MEHARI). Two …
… FMEA with common approaches in IT security risk assessment (Use Cases, MEHARI). Two …
… of Things (IoT) Cyber Risk–Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment
… analysis is performed of multiple cyber risk assessment approaches, to define a high-level …
IoT risk impact assessment with a Goal-Oriented Approach and the Internet of Things Micro …
IoT risk impact assessment with a Goal-Oriented Approach and the Internet of Things Micro …
Review of security challenges in healthcare internet of things
R Somasundaram, M Thirugnanam - Wireless Networks, 2021 - Springer
… The proposed risk assessment helps to identify the highest impact, causing security … risk
assessment helps to identify the most dangerous security in various IoMTs. Risk assessment …
assessment helps to identify the most dangerous security in various IoMTs. Risk assessment …
Securing the Internet of Things: Challenges, threats and solutions
… Then we define a risk assessment model which calculates qualitatively and quantitatively
the risk level of potential threats. More specifically, this model rates each threat as (1) Low, (2) …
the risk level of potential threats. More specifically, this model rates each threat as (1) Low, (2) …
Congestive heart failure risk assessment monitoring through internet of things and mobile personal health systems
EG Spanakis, M Psaraki… - 2018 40th Annual …, 2018 - ieeexplore.ieee.org
… disease risks. To do so we incorporated a pair of verified risk assessment models (Figure
1) for cardiovascular diseases and developed a personalized mobile application for real …
1) for cardiovascular diseases and developed a personalized mobile application for real …
Developing an adaptive Risk-based access control model for the Internet of Things
… This model uses the risk assessment to estimate the risk value depending on outcomes of
actions in term of availability, confidentiality, and integrity. However, this model did not provide …
actions in term of availability, confidentiality, and integrity. However, this model did not provide …
[图书][B] Managing risk for the internet of things
JA Lewis - 2016 - JSTOR
… “Internet of Things” was first used in the 1990s to describe networked devices with computing
power and Internet … This paper looks at risk and how we measure it, as a way to guide the …
power and Internet … This paper looks at risk and how we measure it, as a way to guide the …
Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management
I Lee - Future internet, 2020 - mdpi.com
… Despite weak security measures, existing risk assessment methods are not appropriate for
… risk assessment methods are not sufficiently designed for cybersecurity risk assessment of …
… risk assessment methods are not sufficiently designed for cybersecurity risk assessment of …