A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Cybersecurity in the internet of things in industrial management
RJ Raimundo, AT Rosário - Applied Sciences, 2022 - mdpi.com
Nowadays, people live amidst the smart home domain, while there are business
opportunities in industrial smart cities and healthcare. However, there are concerns about …
opportunities in industrial smart cities and healthcare. However, there are concerns about …
Easing the conscience with OPC UA: An internet-wide study on insecure deployments
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …
process automation, move closer and closer to the Internet, mandating secure …
Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …
Internet requires fundamental changes in security to uphold secure and safe operation …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles
Besides coming with unprecedented benefits, the Internet of Things (IoT) suffers deficits in
security measures, leading to attacks increasing every year. In particular, network …
security measures, leading to attacks increasing every year. In particular, network …
HoneyComb: A darknet-centric proactive deception technique for curating IoT malware forensic artifacts
MS Pour, J Khoury, E Bou-Harb - NOMS 2022-2022 IEEE/IFIP …, 2022 - ieeexplore.ieee.org
Conventional IoT honeypots are known to suffer from scalability and management issues,
while accumulating stringent costs. Further, their passive nature hinders the wide-scale …
while accumulating stringent costs. Further, their passive nature hinders the wide-scale …
Sanitizing the IoT cyber security posture: An operational CTI feed backed up by Internet measurements
MS Pour, D Watson, E Bou-Harb - 2021 51st Annual IEEE/IFIP …, 2021 - ieeexplore.ieee.org
The Internet-of-Things (IoT) paradigm at large continues to be compromised, hindering the
privacy, dependability, security, and safety of our nations. While the operational security …
privacy, dependability, security, and safety of our nations. While the operational security …
Edge security for sip-enabled iot devices with p4
The exponential growth of IoT devices poses security concerns, in part because they provide
a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 …
a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 …
Analyzing IoT Hosts in the IPv6 Internet
Users and businesses are increasingly deploying Internet of Things (IoT) devices at home,
at work, and in factories. At the same time, we see an increase in the use of IPv6 for Internet …
at work, and in factories. At the same time, we see an increase in the use of IPv6 for Internet …