[HTML][HTML] Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities

A Bhardwaj, S Bharany, AW Abulfaraj… - Egyptian Informatics …, 2024 - Elsevier
Smart home devices have brought in a disruptive, revolutionary Internet-based ecosystem
that enhanced our daily lives but has pushed private data from inside our homes to external …

CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications

JD de Hoz Diego, T Madi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Security in Internet-of-Things (IoT) environments has become a major concern. This is partly
due to a large number of remotely exploitable IoT vulnerabilities in service authentication …

SmartLVEnergy: An AIoT Framework for Energy Management through Distributed Processing and Sensor-Actuator Integration in Legacy Low-Voltage Systems

R Fernandes, C Costa, R Gomes… - IEEE Sensors …, 2024 - ieeexplore.ieee.org
Digital integration is essential for efficient and sustainable management of energy
resources, especially in modernizing outdated infrastructures. This involves embedding …

[HTML][HTML] PARIOT: Anti-repackaging for IoT firmware integrity

L Verderame, A Ruggia, A Merlo - Journal of Network and Computer …, 2023 - Elsevier
IoT repackaging refers to an attack devoted to tampering with a legitimate firmware package
by modifying its content (eg, injecting some malicious code) and re-distributing it in the wild …

The Vulnerabilities and Risks of Implementing Internet of Things (IoT) in Cyber Security

L Cambosuela, M Kaur, R Astya - 2024 11th International …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) refers to the growing network of connected physical objects
embedded with sensors, software and connectivity. While IoT has potential benefits, it also …

CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications

JDH Diego, T Madi, C Konstantinou - 2024 - repository.kaust.edu.sa
Abstract Security in Internet-of-Things (IoT) environments has become a major concern. This
is partly due to a large number of remotely exploitable IoT vulnerabilities in service …

Exploring Shifting Patterns in Recent IoT Malware

J Carrillo-Mondejar… - European …, 2024 - papers.academic-conferences.org
The rise of malware targeting interconnected infrastructures has surged in recent years,
driven largely by the widespread presence of vulnerable legacy IoT devices and …

Behavior Analysis and Abnormal Detection Technology of Children's Internet of Things Devices Based on Big data

G Jun - … International Conference on Integrated Intelligence and …, 2023 - ieeexplore.ieee.org
The security and health status of the children's IoT system will have a direct impact on the
future big data analysis and processing technology, so it is very necessary and meaningful …