[HTML][HTML] Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities
A Bhardwaj, S Bharany, AW Abulfaraj… - Egyptian Informatics …, 2024 - Elsevier
Smart home devices have brought in a disruptive, revolutionary Internet-based ecosystem
that enhanced our daily lives but has pushed private data from inside our homes to external …
that enhanced our daily lives but has pushed private data from inside our homes to external …
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications
JD de Hoz Diego, T Madi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Security in Internet-of-Things (IoT) environments has become a major concern. This is partly
due to a large number of remotely exploitable IoT vulnerabilities in service authentication …
due to a large number of remotely exploitable IoT vulnerabilities in service authentication …
SmartLVEnergy: An AIoT Framework for Energy Management through Distributed Processing and Sensor-Actuator Integration in Legacy Low-Voltage Systems
R Fernandes, C Costa, R Gomes… - IEEE Sensors …, 2024 - ieeexplore.ieee.org
Digital integration is essential for efficient and sustainable management of energy
resources, especially in modernizing outdated infrastructures. This involves embedding …
resources, especially in modernizing outdated infrastructures. This involves embedding …
[HTML][HTML] PARIOT: Anti-repackaging for IoT firmware integrity
IoT repackaging refers to an attack devoted to tampering with a legitimate firmware package
by modifying its content (eg, injecting some malicious code) and re-distributing it in the wild …
by modifying its content (eg, injecting some malicious code) and re-distributing it in the wild …
The Vulnerabilities and Risks of Implementing Internet of Things (IoT) in Cyber Security
The Internet of Things (IoT) refers to the growing network of connected physical objects
embedded with sensors, software and connectivity. While IoT has potential benefits, it also …
embedded with sensors, software and connectivity. While IoT has potential benefits, it also …
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications
Abstract Security in Internet-of-Things (IoT) environments has become a major concern. This
is partly due to a large number of remotely exploitable IoT vulnerabilities in service …
is partly due to a large number of remotely exploitable IoT vulnerabilities in service …
Exploring Shifting Patterns in Recent IoT Malware
J Carrillo-Mondejar… - European …, 2024 - papers.academic-conferences.org
The rise of malware targeting interconnected infrastructures has surged in recent years,
driven largely by the widespread presence of vulnerable legacy IoT devices and …
driven largely by the widespread presence of vulnerable legacy IoT devices and …
Behavior Analysis and Abnormal Detection Technology of Children's Internet of Things Devices Based on Big data
G Jun - … International Conference on Integrated Intelligence and …, 2023 - ieeexplore.ieee.org
The security and health status of the children's IoT system will have a direct impact on the
future big data analysis and processing technology, so it is very necessary and meaningful …
future big data analysis and processing technology, so it is very necessary and meaningful …