Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …
emergence of new computing paradigms that have gained importance across a wide …
A systematic review of crime facilitated by the consumer Internet of Things
JM Blythe, SD Johnson - Security Journal, 2021 - Springer
The nature of crime is changing—estimates suggest that at least half of all crime is now
committed online. Once everyday objects (eg televisions, baby monitors, door locks) that are …
committed online. Once everyday objects (eg televisions, baby monitors, door locks) that are …
[PDF][PDF] Threat modeling: a summary of available methods
N Shevchenko, TA Chick, P O'Riordan… - Software Engineering …, 2018 - modeler.org.cn
“Threat modeling is the key to a focused defense. Without threat modeling, you can never
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …
PowerHammer: Exfiltrating data from air-gapped computers through power lines
M Guri, B Zadov, D Bykhovsky… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, we provide an implementation, evaluation, and analysis of PowerHammer-an
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
attack that uses power lines to exfiltrate data from air-gapped computers. A malicious code …
Scalable analysis of interaction threats in iot systems
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us
more vulnerable to safety and security threats than ever before. Many of these threats are …
more vulnerable to safety and security threats than ever before. Many of these threats are …
[PDF][PDF] PSAP-WSN: a provably secure authentication protocol for 5g-based wireless sensor networks
Nowadays, the widespread application of 5G has promoted rapid development in different
areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of …
areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of …
[HTML][HTML] A cyber-physical risk assessment approach for Internet of Things enabled transportation infrastructure
Featured Application Cyber and physical security of transportation infrastructure. Abstract A
critical transportation infrastructure integrated with the Internet of Things based wireless …
critical transportation infrastructure integrated with the Internet of Things based wireless …
[HTML][HTML] SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks
I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
Enhanced authentication protocol for the Internet of Things environment
The Internet of Things (IoT) is among the most promising technologies of the future, and its
development has garnered attention worldwide. However, the rise of the IoT has been …
development has garnered attention worldwide. However, the rise of the IoT has been …
Demystifying authentication concepts in smartphones: Ways and types to secure access
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …
conventional use, that is, calling and texting, they have also been used to perform multiple …