An exploratory analysis of the security risks of the Internet of Things in finance
… risk assessment; rather, we aim to provide indications of potential areas of focus. Like with
any risk assessment … Note that risk assessments take intense effort to conduct correctly, and a …
any risk assessment … Note that risk assessments take intense effort to conduct correctly, and a …
Threat-based security analysis for the internet of things
… risk assessment is what will most likely determine the security level for many systems. We
provide a preliminary risk assessment … The risk assessment takes into account the severity of …
provide a preliminary risk assessment … The risk assessment takes into account the severity of …
[HTML][HTML] Epistemological equation for analysing uncontrollable states in complex systems: Quantifying cyber risks from the internet of things
… risk quantification is discussed and expanded further in the remainder of this article and applied
to build a target state for IoT risk assessment … risk assess different cyber risk assessment …
to build a target state for IoT risk assessment … risk assess different cyber risk assessment …
Countermeasure security risks management in the internet of things based on fuzzy logic inference
I Kotenko, I Saenko, S Ageev - 2015 IEEE Trustcom/BigDataSE …, 2015 - ieeexplore.ieee.org
… risk assessment and management for IoT. Mathematical models for security risk assessment
… Mamdani fuzzy inference procedures for risk assessment and management are developed. …
… Mamdani fuzzy inference procedures for risk assessment and management are developed. …
A conceptual model for Internet of Things risk assessment in healthcare domain with deep learning approach
… Besides, this paper includes a review of three IoT risk assessment models that are based
on … risk assessment model, which aims to provide a real-time monitoring and mitigating risks …
on … risk assessment model, which aims to provide a real-time monitoring and mitigating risks …
Internet of Things–the future of managing supply chain risks
HS Birkel, E Hartmann - Supply Chain Management: An International …, 2020 - emerald.com
… As illustrated in our analysis, IoT implementation could improve risk assessment. In
particular, the adoption of quantitative methods offers the possibility for an in-depth …
particular, the adoption of quantitative methods offers the possibility for an in-depth …
[PDF][PDF] The internet of things in healthcare: an overview, challenges and model plan for security risks management process
… Firstly, is the context establishment whereby in this case is the IoT risk in healthcare. Followed
by the risk assessment which consists of risk identification, risk analysis and risk evaluation…
by the risk assessment which consists of risk identification, risk analysis and risk evaluation…
A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow
H Wang, Z Chen, J Zhao, X Di, D Liu - Ieee Access, 2018 - ieeexplore.ieee.org
… A new lightweight method for security risk assessment based on fuzzy cognitive maps.
Journal of Applied Mathematics and Computer Science, 2014,24,213-225. [18] Qiu,H.; Wang,K. …
Journal of Applied Mathematics and Computer Science, 2014,24,213-225. [18] Qiu,H.; Wang,K. …
Toward the automation of threat modeling and risk assessment in IoT systems
… risk profile, while our approach founds on a standard IoT characterization, relies upon widely
accepted methodologies for risk assessment… of security analysis and risk assessment of IoT …
accepted methodologies for risk assessment… of security analysis and risk assessment of IoT …
Internet of things security
J Dazine, A MAIZATE… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
… e) Risk assessment : It examines every possible threat and weakness within security
mechanisms and node [19] and discovers the new threats to the system. It could help preventing the …
mechanisms and node [19] and discovers the new threats to the system. It could help preventing the …