HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud

WL Sun, YH Tang, YL Huang - Software Testing, Verification …, 2023 - Wiley Online Library
… processes has introduced the Internet of Things (IoT) and … Tailoring a risk assessment system
for Industrial IoT (IIoT) is … AHPs) and propose Hierarchical Risk Assessment Model (HiRAM) …

Cybersecurity Risks Mitigation in the Internet of Things

A Alagappan, LJB Andrews… - 2022 2nd …, 2022 - ieeexplore.ieee.org
… on addressing the assessment of cybersecurity threats in IoT and its vectors through a risk-…
highlighting and discussing the traditional cyber risk assessment techniques at length. Built …

Integration of cyber security frameworks, models and approaches for building design principles for the internet-of-things in industry 4.0

P Radanliev, D De Roure, JRC Nurse… - … the Internet of Things …, 2018 - ieeexplore.ieee.org
… ), by bridging gaps between cyber risk and economic value. The research will benefit the
literature by integrating economic impact and cyber risk assessment models that have not been …

Internet of Things (IoT) technologies for managing indoor radon risk exposure: applications, opportunities, and future challenges

P Barros, A Curado, SI Lopes - Applied Sciences, 2021 - mdpi.com
… To prevent issues related to “sick buildings” in 1987, WHO published the 1st edition of the
“Air Quality Guidelines for Europe” [44], containing the health risk assessment of 28 chemical …

A survey of cybersecurity certification for the internet of things

SN Matheu, JL Hernandez-Ramos… - ACM Computing …, 2020 - dl.acm.org
… build a structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This
… We also examine current efforts related to risk assessment and testing processes, which are …

Adaptive risk-aware access control model for Internet of Things

TA Rath, JN Colin - … Workshop on Secure Internet of Things  …, 2017 - ieeexplore.ieee.org
… We define a risk-threshold is a maximum risk tolerant that access control system is willing
to … Let F be a set of risk assessment functions where f ∈ F. Risk assessment function is a …

Applying adaptive security techniques for risk analysis of internet of things (IoT)-based smart agriculture

AR Riaz, SMM Gilani, S Naseer, S Alshmrany, M Shafiq… - Sustainability, 2022 - mdpi.com
… There is a state x that is outside of the risk-free environment as it is not in an ideal risk-free …
Rx = 1, risk assessment factors are inadequately fulfilled. Risk assessment may be affected by …

Cyber security framework for the internet-of-things in industry 4.0

P Radanliev, RM Montalvo, S Cannady, R Nicolescu… - 2019 - preprints.org
… of Internet of Things (IoT) and its associated cyber risks for the Industry 4.0 sector, we correlate
seven cyber risk … economic impact and cyber risk assessment models that have not been …

A survey on cyber risk management for the Internet of Things

EK Parsons, E Panaousis, G Loukas, G Sakellari - Applied Sciences, 2023 - mdpi.com
… of cyber risk management frameworks for the Internet of Things (… results of the IoT cyber risk
assessment portion of the survey, … , IoT cyber risk assessment and IoT cyber risk treatment. …

Innovative risk early warning model based on internet of things under big data technology

C Wang, S Liu - IEEE access, 2021 - ieeexplore.ieee.org
Internet credit finance is introduced, a financial risk identification method based on the big
data technology is proposed, and a risk assessment method for Internet … The actual Internet