Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Anatomy of threats to the internet of things
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …
including personal health care, environmental monitoring, home automation, smart mobility …
Consumer IoT: Security vulnerability case studies and solutions
As consumer Internet of Things (IoT) devices become increasingly pervasive in our society,
there is a need to understand the underpinning security risks. Therefore, in this article, we …
there is a need to understand the underpinning security risks. Therefore, in this article, we …
Surveillance capitalism and the challenge of collective action
S Zuboff - New labor forum, 2019 - journals.sagepub.com
12 New Labor Forum 28 (1) that its excesses might be perceived as the inexorable
expression of the machines it employs. Surveillance capitalists are no exception. For …
expression of the machines it employs. Surveillance capitalists are no exception. For …
A survey of internet of things (IoT) authentication schemes
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …
identification and another way for communication with each other. The spectrum of IoT …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …
controlling and monitoring of the connected smart objects. IoT applications range over a …
PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities
The ubiquitous use of Internet of Things (IoT) ranges from industrial control systems to e-
Health, e-commerce, smart cities, agriculture, supply chain management, smart cars, cyber …
Health, e-commerce, smart cities, agriculture, supply chain management, smart cars, cyber …
A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …
The age of surveillance capitalism
S Zuboff - Social theory re-wired, 2023 - taylorfrancis.com
Behavioral surplus defines Google's earnings success. In 2016, 89 percent of the revenues
of its parent company, Alphabet, derived from Google's targeted advertising programs. The …
of its parent company, Alphabet, derived from Google's targeted advertising programs. The …