[HTML][HTML] Model-based security testing in IoT systems: A Rapid Review

F Lonetti, A Bertolino, F Di Giandomenico - Information and Software …, 2023 - Elsevier
Context: Security testing is a challenging and effort-demanding task in IoT scenarios. The
heterogeneous devices expose different vulnerabilities that can influence the methods and …

An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming

FM Teichmann, SR Boticiu - International Cybersecurity Law Review, 2023 - Springer
Although red teaming and penetration testing are similar in their end results, it is important
for organizations to choose the right assessment for the right purpose, taking into account …

Future Trends and Emerging Threats in Drone Cybersecurity

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Issues and Challenges …, 2024 - igi-global.com
The rapid proliferation of drone technology has ushered in a new era of innovation and
convenience across various industries. However, this technological advancement has also …

Healthcare System and Infra-Security

DP Sharma, A Habibi Lashkari, M Parizadeh - … Management in Healthcare …, 2024 - Springer
The convergence of digitization and globalization has revolutionized various sectors,
including healthcare, by enabling rapid expansion and efficient communication through the …

Multi-source Analysis of AI Vulnerabilities: Methodology and Algorithms of Data Collection

O Neretin, V Kharchenko… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
The initial stage of assessing the cybersecurity of artificial intelligence (AI) systems and tools
for cyber-physical systems is the collecting, processing and integrating of vulnerability data …

Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security

P Agrawal, GK Gupta, G Kaur, K Bhele… - AIP Conference …, 2024 - pubs.aip.org
To protect user data and digital infrastructure ethical hacking has become a tool, in the
changing field of cybersecurity. This introductory passage provides an overview of a paper …

Systematic Review of Fuzzing in IoT: Evaluating Techniques, Vulnerabilities, and Research Gaps

A Touqir, F Iradat, A Rakib, N Taskin, H Jadidbonab… - 2024 - researchsquare.com
As our dependence on the internet and digital platforms grows, the risk of cyber threats rises,
making it essential to implement effective Measures to safeguard sensitive information …

A Scoping Review of Intelligent Cyber-Physical Systems in Healthcare

KC Gull, SG Kanakaraddi, AK Chikaraddi… - Intelligent Cyber-Physical …, 2024 - Springer
The chapter delves into the pivotal role of Intelligent Cyber-Physical Systems (CPS) within
the healthcare domain, elucidating their transformative potential and myriad benefits. Amidst …

A Holistic Approach for Cyber Security Vulnerability Assessment Based on Open Source Tools: Nikto, Acunitx, ZAP, Nessus and Enhanced with AI-Powered Tool …

AM Sllame, TE Tomia… - 2024 IEEE 4th International …, 2024 - ieeexplore.ieee.org
This paper describes a cyber security vulnerability assessment methodology powered by AI
tactics. The AI-powered tool “ImmuniWeb AI” effectively supported the tools of the suggested …

A Comparative Study on Vulnerabilities, Challenges, and Security Measures in Wireless Network Security

A Ullah, MN Sakib, MH Rahman, MSK Shahin… - … on Intelligent Systems …, 2023 - Springer
Featuring a focus on machine learning algorithms and the crucial field of wireless network
security, this research project emphasizes the strategic usage of honeypots through a variety …