An overview of safety and security analysis frameworks for the internet of things

A Abdulhamid, S Kabir, I Ghafir, C Lei - Electronics, 2023 - mdpi.com
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …

Dependability of the internet of things: Current status and challenges

A Abdulhamid, S Kabir, I Ghafir… - … Conference on Electrical …, 2022 - ieeexplore.ieee.org
The advances in the Internet of Things (IoT) has substantially contributed to the automation
of modern societies by making physical things around us more interconnected and remotely …

Boost‐Defence for resilient IoT networks: A head‐to‐toe approach

Q Abu Al‐Haija, A Al Badawi, GR Bojja - Expert Systems, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) is an emerging technology that is considered a key
enabler for next‐generation smart cities, industries, security services and economies. IoT …

SALT: transfer learning-based threat model for attack detection in smart home

P Anand, Y Singh, H Singh, MD Alshehri, S Tanwar - Scientific Reports, 2022 - nature.com
The next whooping revolution after the Internet is its scion, the Internet of Things (IoT), which
has facilitated every entity the power to connect to the web. However, this magnifying depth …

Automotive cybersecurity vulnerability assessment using the common vulnerability scoring system and Bayesian network model

Y Wang, B Yu, H Yu, L Xiao, H Ji… - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
As a promising technology, connected and autonomous vehicle (CAV) can reduce energy
consumption and improve transportation safety. Nevertheless, as more enabling …

Metaheuristic routing: a taxonomy and energy-efficient framework for internet of things

B Rana, Y Singh, H Singh - IEEE Access, 2021 - ieeexplore.ieee.org
The complex and heterogeneous ecosystem of the Internet of Things (IoT) makes it difficult
to achieve energy-efficient routing because of the power, memory, and processing …

Vulnerability prioritization: An offensive security approach

MF Bulut, A Adebayo, D Sow, S Ocepek - arXiv preprint arXiv:2206.11182, 2022 - arxiv.org
Organizations struggle to handle sheer number of vulnerabilities in their cloud
environments. The de facto methodology used for prioritizing vulnerabilities is to use …

Learning-based techniques for assessing zero-day attacks and vulnerabilities in IoT

P Anand, Y Singh, A Selwal - … in Computing: Proceedings of ICRIC 2021 …, 2022 - Springer
Everyday things have made their way across the Internet to enable remote control and
monitoring, covering the umbrella of Ubiquitous Computing, and thus, providing billion of …

Vulnerability Assessment Tools for IoT: An Agile Approach

P Anand, Y Singh - Agile Software Development: Trends …, 2023 - Wiley Online Library
Smart services being more high‐handed than ever before increased the security
contemplations which faded with growing divergence in threat variants and IoT devices. To …

A framework for optimal patch release time using G-DEMATEL and multi-attribute utility theory

M Anjum, AHS Garmabaki, PK Kapur… - … of Industrial and …, 2024 - inderscienceonline.com
The primary focus of the present work is to determine the optimal vulnerability patch release
time using multi-attribute utility theory (MAUT) by considering two objectives that are cost …