Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design

JBF Sequeiros, FT Chimuco, MG Samaila… - ACM Computing …, 2020 - dl.acm.org
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …

A systematic review of crime facilitated by the consumer Internet of Things

JM Blythe, SD Johnson - Security Journal, 2021 - Springer
The nature of crime is changing—estimates suggest that at least half of all crime is now
committed online. Once everyday objects (eg televisions, baby monitors, door locks) that are …

[PDF][PDF] Threat modeling: a summary of available methods

N Shevchenko, TA Chick, P O'Riordan… - Software Engineering …, 2018 - modeler.org.cn
“Threat modeling is the key to a focused defense. Without threat modeling, you can never
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …

PowerHammer: Exfiltrating data from air-gapped computers through power lines

M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …

Scalable analysis of interaction threats in iot systems

M Alhanahnah, C Stevens, H Bagheri - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us
more vulnerable to safety and security threats than ever before. Many of these threats are …

[PDF][PDF] PSAP-WSN: a provably secure authentication protocol for 5g-based wireless sensor networks

X Li, S Liu, S Kumari, CM Chen - CMES-Computer Modeling in …, 2023 - cdn.techscience.cn
Nowadays, the widespread application of 5G has promoted rapid development in different
areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of …

[HTML][HTML] A cyber-physical risk assessment approach for Internet of Things enabled transportation infrastructure

K Ntafloukas, DP McCrum, L Pasquale - Applied Sciences, 2022 - mdpi.com
Featured Application Cyber and physical security of transportation infrastructure. Abstract A
critical transportation infrastructure integrated with the Internet of Things based wireless …

[HTML][HTML] SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks

I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …

Enhanced authentication protocol for the Internet of Things environment

CM Chen, X Li, S Liu, ME Wu… - Security and …, 2022 - Wiley Online Library
The Internet of Things (IoT) is among the most promising technologies of the future, and its
development has garnered attention worldwide. However, the rise of the IoT has been …

Demystifying authentication concepts in smartphones: Ways and types to secure access

S Gupta, A Buriro, B Crispo - Mobile Information Systems, 2018 - Wiley Online Library
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …