The rise of ransomware and emerging security challenges in the Internet of Things

I Yaqoob, E Ahmed, MH ur Rehman, AIA Ahmed… - Computer Networks, 2017 - Elsevier
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …

Virtual fog: A virtualization enabled fog computing framework for Internet of Things

J Li, J Jin, D Yuan, H Zhang - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The prosperity of Internet of Things (IoT) and the success of rich Cloud services have
expedited the emergence of a new computing paradigm called Fog computing, which …

Systematic review of internet of things security

A Amiruddin, AAP Ratna… - International Journal of …, 2019 - search.proquest.com
Abstract The Internet of Things has become a new paradigm of current communications
technology that requires a deeper overview to map its application domains, advantages, and …

Service embedding in IoT networks

HQ Al-Shammari, AQ Lawey, TEH El-Gorashi… - IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is the cornerstone of smart applications such as smart buildings,
smart factories, home automation, and healthcare automation. These smart applications …

[HTML][HTML] SPD-Safe: Secure administration of railway intelligent transportation systems

G Hatzivasilis, K Fysarakis, S Ioannidis, I Hatzakis… - Electronics, 2021 - mdpi.com
The railway transport system is critical infrastructure that is exposed to numerous man-made
and natural threats, thus protecting this physical asset is imperative. Cyber security, privacy …

CTL-based adaptive service composition in edge networks

D Zhao, Z Zhou, PCK Hung, S Deng… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
With the recent adoption of edge computing, I nternet of T hings (IoT) devices collaborate at
the network edge to facilitate edge-native applications. In this setting, IoT devices are …

Analysis of high-rise building safety detection methods based on big data and artificial intelligence

J Xu, C Yan, Y Su, Y Liu - International Journal of Distributed …, 2020 - journals.sagepub.com
With rapid industrialization, the construction of high-rise buildings is a good and effective
solution to the rational and effective use of land resources and alleviation of existing land …

[PDF][PDF] IoT system model, challenges and threats

B Ahlawat, A Sangwan, V Sindhu - Int. J. Sci. Technol. Res, 2020 - academia.edu
IOT (Internet of things) have emerged incredibly since its beginning and today one can
easily make use of extensive applications that have entered into real world may it be smart …

A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem

BUI Khan, RF Olanrewaju, F Anwar… - … of Information and …, 2019 - inderscienceonline.com
Increasing proliferation of IoT has led to an evolution of various devices for realising the
smart features of ubiquitous applications. However, the inclusion of such a massive pool of …

[HTML][HTML] Artificial intelligence-driven composition and security validation of an internet of things ecosystem

G Hatzivasilis, N Papadakis, I Hatzakis, S Ioannidis… - Applied Sciences, 2020 - mdpi.com
Key challenges in Internet-of-Things (IoT) system design and management include the
secure system composition and the calculation of the security and dependability level of the …