An overview of safety and security analysis frameworks for the internet of things
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …
benefits, including many security and safety-critical applications. However, unlocking the full …
Dependability of the internet of things: Current status and challenges
The advances in the Internet of Things (IoT) has substantially contributed to the automation
of modern societies by making physical things around us more interconnected and remotely …
of modern societies by making physical things around us more interconnected and remotely …
Boost‐Defence for resilient IoT networks: A head‐to‐toe approach
Abstract The Internet of Things (IoT) is an emerging technology that is considered a key
enabler for next‐generation smart cities, industries, security services and economies. IoT …
enabler for next‐generation smart cities, industries, security services and economies. IoT …
SALT: transfer learning-based threat model for attack detection in smart home
The next whooping revolution after the Internet is its scion, the Internet of Things (IoT), which
has facilitated every entity the power to connect to the web. However, this magnifying depth …
has facilitated every entity the power to connect to the web. However, this magnifying depth …
Automotive cybersecurity vulnerability assessment using the common vulnerability scoring system and Bayesian network model
Y Wang, B Yu, H Yu, L Xiao, H Ji… - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
As a promising technology, connected and autonomous vehicle (CAV) can reduce energy
consumption and improve transportation safety. Nevertheless, as more enabling …
consumption and improve transportation safety. Nevertheless, as more enabling …
Metaheuristic routing: a taxonomy and energy-efficient framework for internet of things
The complex and heterogeneous ecosystem of the Internet of Things (IoT) makes it difficult
to achieve energy-efficient routing because of the power, memory, and processing …
to achieve energy-efficient routing because of the power, memory, and processing …
Vulnerability prioritization: An offensive security approach
Organizations struggle to handle sheer number of vulnerabilities in their cloud
environments. The de facto methodology used for prioritizing vulnerabilities is to use …
environments. The de facto methodology used for prioritizing vulnerabilities is to use …
Learning-based techniques for assessing zero-day attacks and vulnerabilities in IoT
Everyday things have made their way across the Internet to enable remote control and
monitoring, covering the umbrella of Ubiquitous Computing, and thus, providing billion of …
monitoring, covering the umbrella of Ubiquitous Computing, and thus, providing billion of …
Vulnerability Assessment Tools for IoT: An Agile Approach
Smart services being more high‐handed than ever before increased the security
contemplations which faded with growing divergence in threat variants and IoT devices. To …
contemplations which faded with growing divergence in threat variants and IoT devices. To …
A framework for optimal patch release time using G-DEMATEL and multi-attribute utility theory
The primary focus of the present work is to determine the optimal vulnerability patch release
time using multi-attribute utility theory (MAUT) by considering two objectives that are cost …
time using multi-attribute utility theory (MAUT) by considering two objectives that are cost …