A review on the security of the internet of things: Challenges and solutions
Abstract The Internet of Things (IoT) has emerged as a modern wave of Internet
technologies that promises great transformation of life in areas such as smart health, smart …
technologies that promises great transformation of life in areas such as smart health, smart …
IoT bugs and development challenges
A Makhshari, A Mesbah - 2021 IEEE/ACM 43rd International …, 2021 - ieeexplore.ieee.org
IoT systems are rapidly adopted in various domains, from embedded systems to smart
homes. Despite their growing adoption and popularity, there has been no thorough study to …
homes. Despite their growing adoption and popularity, there has been no thorough study to …
[HTML][HTML] The anatomy of a vulnerability database: A systematic mapping study
Software vulnerabilities play a major role, as there are multiple risks associated, including
loss and manipulation of private data. The software engineering research community has …
loss and manipulation of private data. The software engineering research community has …
A security analysis method for industrial Internet of Things
H Mouratidis, V Diamantopoulou - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The industrial Internet of Things (IIoT) provide an opportunity for industries to build large
interconnected systems that utilize various technologies, such as personal computers …
interconnected systems that utilize various technologies, such as personal computers …
Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet
connectivity beyond traditional computing devices like computers and smartphones to the …
connectivity beyond traditional computing devices like computers and smartphones to the …
[HTML][HTML] The IoT security gap: a look down into the valley between threat models and their implementation
P Aufner - International Journal of Information Security, 2020 - Springer
We claim to have identified gaps between threat modeling frameworks, threat model use in
IoT security research and attacks that may be missed by current research. While security …
IoT security research and attacks that may be missed by current research. While security …
An interval type-2 fuzzy reasoning model for digital transformation project risk assessment
İ Gölcük - Expert Systems with Applications, 2020 - Elsevier
This study presents a new risk assessment model by combining interval type-2 fuzzy best-
worst method (IT2F-BWM) and perceptual reasoning for risk evaluation of digital …
worst method (IT2F-BWM) and perceptual reasoning for risk evaluation of digital …
Identifying security risks of digital transformation-an engineering perspective
A Nguyen Duc, A Chirumamilla - … for a Sustainable Society in the 21st …, 2019 - Springer
Technological advancements continue to disrupt how organizations compete and create
value in almost every industry and society. The recent digital transformation movement has …
value in almost every industry and society. The recent digital transformation movement has …
Automated security assessment for the internet of things
Internet of Things (IoT) based applications face an increasing number of potential security
risks, which need to be systematically assessed and addressed. Expert-based manual …
risks, which need to be systematically assessed and addressed. Expert-based manual …
A systematic mapping study on internet of things challenges
A Lepekhin, A Borremans, I Ilin… - 2019 IEEE/ACM 1st …, 2019 - ieeexplore.ieee.org
The challenge of developing IoT-based systems has been found to be a complex problem. It
is influenced by number of factors: heterogeneous devices/resources, various perception …
is influenced by number of factors: heterogeneous devices/resources, various perception …