Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach
Addressing trust concerns in Smart Home (SH) systems is imperative due to the limited study
on preservation approaches that focus on analyzing and evaluating privacy threats for …
on preservation approaches that focus on analyzing and evaluating privacy threats for …
Key challenges in security of iot devices and securing them with the blockchain technology
B Bryant, H Saiedian - Security and Privacy, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) data processing enables rapid access to large volumes of
data with the possibility of improving service‐oriented business models. As such, the rapid …
data with the possibility of improving service‐oriented business models. As such, the rapid …
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture
S Bhattacharjya, H Saiedian - International Journal of Information Security, 2022 - Springer
IoT devices are slowly turning out to be an essential part of our everyday lives. These
devices perform one operation, and they specialize in doing so. When communicating with …
devices perform one operation, and they specialize in doing so. When communicating with …
Blockchain implementation in iot privacy and cyber security feasibility study and analysis
YVRS Viswanadham, K Jayavel - High Performance Computing and …, 2022 - Springer
Abstract The Internet of Things (IoT) has a significant role in next-generation information
technology, and its value and importance are broadly recognized. Internet of Things is rising …
technology, and its value and importance are broadly recognized. Internet of Things is rising …
[PDF][PDF] IoT-Deep Learning Based Activity Recommendation System.
S Kannan, RU Anitha… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
The rising use of mobile technology and smart gadgets in the field of health has had a
significant impact on the global community. Health professionals are increasingly making …
significant impact on the global community. Health professionals are increasingly making …
A Brief Review on Internet of Things (IoT)
UM Kandhikonda, R Bejgam… - 2021 International …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is the most familiar technology to the modern society that has actually
transformed the physical objects into smart things that are enhanced with capabilities like …
transformed the physical objects into smart things that are enhanced with capabilities like …
A survey on emerging security issues, challenges, and solutions for Internet of things (IoTs)
A Khan, D Peraković - Advances in Malware and Data-Driven …, 2022 - igi-global.com
The internet of things is a cutting-edge technology that is vulnerable to all sorts of fictitious
solutions. As a new phase of computing emerges in the digital world, it intends to produce a …
solutions. As a new phase of computing emerges in the digital world, it intends to produce a …
Hacking your drone data
J Gabrielsson - 2021 - diva-portal.org
The last couple of years has seen a rapid growth in smart devices. The smart devices are
exponentially gaining more popularity both as a complement to our daily lives in the form of …
exponentially gaining more popularity both as a complement to our daily lives in the form of …
Inspection and Surveillance of Energy Consumption in IoT-Smart Grid Using Wireless Sensor Network
Real time data transfer, network communication and configuration of control systems are
currently growing on as a part of development of smart power grid monitoring systems. To …
currently growing on as a part of development of smart power grid monitoring systems. To …
[PDF][PDF] A Novel Simplified Framework to Secure IoT Communications.
S Bhattacharjya, H Saiedian - ICISSP, 2021 - scitepress.org
IoT devices are already in the process of becoming an essential part of our everyday lives.
These devices specialize in performing a single operation efficiently. To maintain the privacy …
These devices specialize in performing a single operation efficiently. To maintain the privacy …