Machine learning approaches to IoT security: A systematic literature review
With the continuous expansion and evolution of IoT applications, attacks on those IoT
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …
[HTML][HTML] State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …
that are embedded with sensors, software, and other technologies intending to connect and …
[HTML][HTML] A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats …
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …
deployed and the range of applications in which such devices are used. They vary widely in …
The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
Cloud computing, edge computing, and Internet-of-Things-these new Internet concepts have
already irreversibly changed and influenced people's lives. The security of the three patterns …
already irreversibly changed and influenced people's lives. The security of the three patterns …
[HTML][HTML] IIoT malware detection using edge computing and deep learning for cybersecurity in smart factories
H Kim, K Lee - Applied Sciences, 2022 - mdpi.com
The smart factory environment has been transformed into an Industrial Internet of Things
(IIoT) environment, which is an interconnected and open approach. This has made smart …
(IIoT) environment, which is an interconnected and open approach. This has made smart …
[HTML][HTML] IoT vulnerabilities and attacks: SILEX malware case study
The Internet of Things (IoT) is rapidly growing and is projected to develop in future years.
The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical …
The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical …
[HTML][HTML] Cybersecurity model based on hardening for secure internet of things implementation
The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids,
and other smart concepts has driven data-driven decision making by managers and …
and other smart concepts has driven data-driven decision making by managers and …
[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Abstract The Internet of Things (IoT) has set the way for the continuing digitalization of
society in various manners during the past decade. The IoT is a vast network of intelligent …
society in various manners during the past decade. The IoT is a vast network of intelligent …
Device-specific security challenges and solution in IoT edge computing: a review
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …
IoT devices vary in terms of shape, size, storage, battery life, and computational power …
Security analysis of a digital twin framework using probabilistic model checking
Digital Twins (DTs) have been gaining popularity in various applications, such as smart
manufacturing, smart energy, smart mobility, and smart healthcare. In simple terms, DT is …
manufacturing, smart energy, smart mobility, and smart healthcare. In simple terms, DT is …