An exploratory analysis of the security risks of the Internet of Things in finance

C Shepherd, FAP Petitcolas, RN Akram… - Trust, Privacy and …, 2017 - Springer
risk assessment; rather, we aim to provide indications of potential areas of focus. Like with
any risk assessment … Note that risk assessments take intense effort to conduct correctly, and a …

Threat-based security analysis for the internet of things

AW Atamli, A Martin - … workshop on secure internet of things, 2014 - ieeexplore.ieee.org
risk assessment is what will most likely determine the security level for many systems. We
provide a preliminary risk assessment … The risk assessment takes into account the severity of …

[HTML][HTML] Epistemological equation for analysing uncontrollable states in complex systems: Quantifying cyber risks from the internet of things

P Radanliev, D De Roure, P Burnap… - The Review of …, 2021 - Springer
risk quantification is discussed and expanded further in the remainder of this article and applied
to build a target state for IoT risk assessmentrisk assess different cyber risk assessment

Countermeasure security risks management in the internet of things based on fuzzy logic inference

I Kotenko, I Saenko, S Ageev - 2015 IEEE Trustcom/BigDataSE …, 2015 - ieeexplore.ieee.org
risk assessment and management for IoT. Mathematical models for security risk assessment
… Mamdani fuzzy inference procedures for risk assessment and management are developed. …

A conceptual model for Internet of Things risk assessment in healthcare domain with deep learning approach

MN Zakaria, NAA Bakar, H Abas… - International Journal of …, 2020 - ijic.utm.my
… Besides, this paper includes a review of three IoT risk assessment models that are based
on … risk assessment model, which aims to provide a real-time monitoring and mitigating risks

Internet of Things–the future of managing supply chain risks

HS Birkel, E Hartmann - Supply Chain Management: An International …, 2020 - emerald.com
… As illustrated in our analysis, IoT implementation could improve risk assessment. In
particular, the adoption of quantitative methods offers the possibility for an in-depth …

[PDF][PDF] The internet of things in healthcare: an overview, challenges and model plan for security risks management process

NAA Bakar, WMW Ramli, NH Hassan - Indonesian Journal of …, 2019 - eprints.utm.my
… Firstly, is the context establishment whereby in this case is the IoT risk in healthcare. Followed
by the risk assessment which consists of risk identification, risk analysis and risk evaluation…

A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow

H Wang, Z Chen, J Zhao, X Di, D Liu - Ieee Access, 2018 - ieeexplore.ieee.org
… A new lightweight method for security risk assessment based on fuzzy cognitive maps.
Journal of Applied Mathematics and Computer Science, 2014,24,213-225. [18] Qiu,H.; Wang,K. …

Toward the automation of threat modeling and risk assessment in IoT systems

V Casola, A De Benedictis, M Rak, U Villano - Internet of Things, 2019 - Elsevier
risk profile, while our approach founds on a standard IoT characterization, relies upon widely
accepted methodologies for risk assessment… of security analysis and risk assessment of IoT …

Internet of things security

J Dazine, A MAIZATE… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
… e) Risk assessment : It examines every possible threat and weakness within security
mechanisms and node [19] and discovers the new threats to the system. It could help preventing the …