Threat analysis of software systems: A systematic literature review

K Tuma, G Calikli, R Scandariato - Journal of Systems and Software, 2018 - Elsevier
Architectural threat analysis has become an important cornerstone for organizations
concerned with developing secure software. Due to the large number of existing techniques …

Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology

R Kumar, R Tripathi - the Journal of Supercomputing, 2021 - Springer
Abstract The Internet of Medical Things (IoMT) is the next frontier in the digital revolution and
it leverages IoT in the healthcare domain. The underlying technology has changed the …

Artificial intelligence techniques for cognitive sensing in future IoT: State-of-the-Art, potentials, and challenges

MO Osifeko, GP Hancke, AM Abu-Mahfouz - Journal of Sensor and …, 2020 - mdpi.com
Smart, secure and energy-efficient data collection (DC) processes are key to the realization
of the full potentials of future Internet of Things (FIoT)-based systems. Currently, challenges …

IoMT-SAF: Internet of medical things security assessment framework

F Alsubaei, A Abuhussein, V Shandilya, S Shiva - Internet of Things, 2019 - Elsevier
The emergence of the Internet of Medical Things (IoMT) has introduced a monumental
change in facilitating the management of diseases, improving diseases diagnosis and …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …

A roadmap toward the resilient internet of things for cyber-physical systems

D Ratasich, F Khalid, F Geissler, R Grosu… - IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is a ubiquitous system connecting many different devices-the
things-which can be accessed from the distance. The cyber-physical systems (CPSs) …

BBNSF: Blockchain-Based Novel Secure Framework Using RP2-RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems

M Kumar, P Mukherjee, S Verma, Kavita, M Kaur… - Sensors, 2022 - mdpi.com
The wearable healthcare equipment is primarily designed to alert patients of any specific
health conditions or to act as a useful tool for treatment or follow-up. With the growth of …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

A state-of-the-art survey on formal verification of the internet of things applications

A Souri, M Norouzi - Journal of Service Science Research, 2019 - Springer
In recent years, Internet of Things (IoT) has been one of the most popular technologies that
facilitate new interactions among things and humans to enhance the quality of life. With the …

A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study

C Braghin, M Lilli, E Riccobene - Computers & Security, 2023 - Elsevier
Abstract IoT (Internet of Things) devices are extensively used in security-critical services, as
for example home door opening, gas monitoring, alarm systems, etc. Often, they use …