Threat modelling and risk assessment in internet of things: A review

M Mahak, Y Singh - Proceedings of Second International Conference on …, 2021 - Springer
… privacy, there is a need for threat modelling and risk assessment in IoT. We will provide a
brief description of various threat models and risk assessment methodologies. 3 Threat Models

A risk assessment methodology for the Internet of Things

S Sicari, A Rizzardi, D Miorandi… - Computer …, 2018 - Elsevier
… In order to demonstrate the feasibility of the presented solution, we concretely applied our
risk assessment methodology to an existing IoT middleware, named NetwOrked Smart objects

A novel risk assessment model for privacy security in internet of things

T Wu, G Zhao - Wuhan University Journal of Natural Sciences, 2014 - Springer
… Abstract: Aiming at the issues of privacy security in Internet of Things (IoT) applications, we
propose an effective risk assessment model to handle probabilistic causality of evaluation

Security risk assessment in internet of things systems

JRC Nurse, S Creese, D De Roure - IT professional, 2017 - ieeexplore.ieee.org
… the case for new methodologies to assess risk in the context of the Internet of Things (IoT). …
’s dynamics and uniqueness while maintaining the rigor of best practice in risk assessment. …

[HTML][HTML] Future developments in cyber risk assessment for the internet of things

P Radanliev, DC De Roure, R Nicolescu, M Huth… - Computers in …, 2018 - Elsevier
assessment model for articulating possible impacts and calculating the economic impact
of IoT cyber risk… other cyber risk assessment approaches in order to build a new model for …

A graph theory based generic risk assessment framework for internet of things (IoT)

VL Shivraj, MA Rajan… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
… frameworks do not effectively address all the risk assessment needs of IoT and hence there
… such risk assessment frameworks. To address these issues, a model-driven risk assessment

Risk analysis in Internet of Things using EBIOS

BF Zahra, B Abdelhamid - 2017 IEEE 7th Annual Computing …, 2017 - ieeexplore.ieee.org
risk analysis based on EBIOS methodology. We aim by this work to determine the most
important security risk … The second section discusses the risk analysis methodology used in this …

[PDF][PDF] The internet of things in healthcare: an overview, challenges and model plan for security risks management process

NAA Bakar, WMW Ramli, NH Hassan - Indonesian Journal of …, 2019 - eprints.utm.my
model to enhance its IoT Security Risk Management model to … , it is expected that this model
shall evolve once it receives the … In the future, this IoT Security Risk Management Model can …

Risk assessment and control of agricultural supply chains under Internet of Things

B Yan, X Wang, P Shi - Agrekon, 2017 - journals.co.za
… Based on these two points, the supply chain risk assessment model using the OWA operator
is employed by this study in the risk assessment stage of the supply chain. The fundamental …

Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things

G George, SM Thampi - Pervasive and Mobile Computing, 2019 - Elsevier
… We propose a multi-attacker multi-target graphical model for risk assessment, representing
the attackers, targets, and the vulnerability relations in the network. Further, we propose risk