Sok: Security evaluation of home-based iot deployments
… These components have many unexplored challenges such as … Security problems involving
Internet of Things (IoT) continue to … communication because of its applicability in other areas. …
Internet of Things (IoT) continue to … communication because of its applicability in other areas. …
Securing internet of things with software defined networking
K Kalkan, S Zeadally - IEEE Communications Magazine, 2017 - ieeexplore.ieee.org
… security mechanism according to their security requirements. Additionally, we propose a role
based security … • Identify unexplored areas in the security space for SDN-IoT integration. • …
based security … • Identify unexplored areas in the security space for SDN-IoT integration. • …
Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges
… farming in conjunction with Internet of Things (IoT). The application … This paper aims to study
the security scenarios applicable in … in each of farming security sub-areas and identifies the …
the security scenarios applicable in … in each of farming security sub-areas and identifies the …
Smart human security framework using internet of things, cloud and fog computing
… IoT and Fog computing are nascent research areas and limited research work has …
unexplored. To the best of our knowledge no existing research work focuses on physical security of …
unexplored. To the best of our knowledge no existing research work focuses on physical security of …
Internet of things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities
MN Bhuiyan, MM Rahman, MM Billah… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
… To mitigate the security problems, an IoT-based security architectural … research gaps and
untouched areas of research and to … We have considered both explored and unexplored issues …
untouched areas of research and to … We have considered both explored and unexplored issues …
[图书][B] Chaotic and unexplored: The complex relationship between security professionals, data breaches, and malicious actors
DL Pearson - 2021 - search.proquest.com
… security from the perspective of security professionals to comprehend the reality of
InfoSec or related security … in all things security-related – data security, technical security (TECHSEC), …
InfoSec or related security … in all things security-related – data security, technical security (TECHSEC), …
Securing the internet of things in the age of machine learning and software-defined networking
… areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible
from anywhere, addressing critical IoT security … still remain substantially unexplored. We …
from anywhere, addressing critical IoT security … still remain substantially unexplored. We …
IoT ignorance is digital forensics research bliss: a survey to understand IoT forensics definitions, challenges and future research directions
… The Internet of Things (IoT) has enabled the creation of … On the other hand, there are many
unexplored areas in IoT forensics … the cyber security of consumer Internet of Things Report. …
unexplored areas in IoT forensics … the cyber security of consumer Internet of Things Report. …
The rise of ransomware and emerging security challenges in the Internet of Things
… Traditional security mechanisms are no longer applicable … This paper presents the
ransomware attacks and security … efforts directed at IoT from a security perspective. A taxonomy is …
ransomware attacks and security … efforts directed at IoT from a security perspective. A taxonomy is …
A systematic survey on the recent advancements in the Social Internet of Things
… review of studies in each area. Furthermore, we discuss … research areas in the context of
SIoT but remain unexplored in the … models available in this area for security and privacy? To …
SIoT but remain unexplored in the … models available in this area for security and privacy? To …