Clean-Slate and Cross-Layer IoT Security Design

S Rajarajeswari, N Hema - Secure Communication in Internet of …, 2024 - taylorfrancis.com
Building secure systems for the Internet of Things (IoT) can only be achieved through a
thorough understanding of the needs of such systems. The state of the art lacks a systematic …

Survey on the Security Threats in IoT System

S Shinly Swarna Sugi, S Raja Ratna - International Conference on Mobile …, 2021 - Springer
The growth of Internet-enabled devices in the recent years is exponential in nature. This has
led to a ubiquitous pool of Internet connectivity of all types of devices (things) ranging from …

[PDF][PDF] Analysis and Evaluation of Current Security Trends in IoT

A Rastogi, S Singhal, A Garg - IPEM JOURNAL OF COMPUTER …, 2018 - ipemgzb.ac.in
Internet of Things (IoT) is the next big boom in the field of networking. IoT refers to the
physical devices that are embedded with Internet, electronics, software, sensors, actuators …

[PDF][PDF] Physics Based Digital Twin Modelling from Theory to Concept Implementation Using Coiled Springs Used in Suspension Systems

M Ammar, A Mousavi, H Al-Raweshidy - cdn.techscience.cn
The advent of technology around the globe based on the Internet of Things, Cloud
Computing, Big Data, Cyber-Physical Systems, and digitalisation. This advancement …

Akıllı Ev Sistemleri için XGBoost Tabanlı Saldırı Tespit Yöntemi

R Tekin, O Yaman - Journal of Intelligent Systems: Theory and Applications - dergipark.org.tr
Günümüz akıllı evlerinde IoT (Internet of Things) teknolojisinin alt yapısı kullanılmaktadır.
Akıllı evlerin kullanımı arttıkça bu alandaki siber saldırılar da artmaktadır. Akıllı evlere yönelik …

[PDF][PDF] Internet of Things Major Security Issues: Challenges and Defense Strategies

A AlZahrani, A Safhi, M Al-Hebbi - International Transaction Journal of …, 2021 - tuengr.com
Abstract The Internet of Things (IoT) has enabled significant advancements in a wide variety
of scientific fields, and as a result, it has emerged as a highly attractive subject in both …

On contact tracing in COVID-19 (SARS-CoV-2) pandemic using lowest common ancestor in m-ary data aggregation tree in the fog-computing enhanced internet of …

AR Khan, MA Chishti - International Journal of Pervasive Computing …, 2022 - emerald.com
Purpose The purpose of this study is to exploit the lowest common ancestor technique in an
m-ary data aggregation tree in the fog computing-enhanced IoT to assist in contact tracing in …

SecureIoT: Hop-Count Based Service-Oriented Efficient Security Solution for IoT

P Kar, S Misra, AK Mandal, H Wang - Proceedings of the 1st …, 2018 - dl.acm.org
Internet of Things (IoT) is a network of physical devices which are accessible through the
Internet. All the devices are assigned with an IP address and are competent enough to …

[PDF][PDF] NESNELERİN İNTERNETİ UYGULAMALARI İÇİN SALDIRI TESPİT YÖNTEMLERİNİN GELİŞTİRİLMESİ

R TEKİN - researchgate.net
Fırat Üniversitesi Fen Bilimleri Enstitüsü tez yazım kurallarına uygun olarak hazırladığım
“Nesnelerin İnterneti Uygulamaları için Saldırı Tespit Yöntemlerinin Geliştirilmesi” Başlıklı …

Модель безпеки інформаційної системи на базі технологій IoT

ДС Литвиненко - 2021 - openarchive.nure.ua
Анотація Метою кваліфікаційної роботи є побудова моделі безпеки для середовища
Інтернету речей, яка має бути невибагливою до обчислювальних ресурсів та …