Autonomic schemes for threat mitigation in Internet of Things

QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …

The internet of battle things

A Kott, A Swami, BJ West - Computer, 2016 - ieeexplore.ieee.org
On the battlefields of the future, multitudes of intelligent things will be communicating, acting,
and collaborating with one another and with human warfighters. This will demand major …

Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges

AA Abba Ari, OK Ngangmo, C Titouna… - Applied Computing …, 2024 - emerald.com
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the
Internet of Things (IoT), has dramatically changed the way treatments are done in the …

Food defence: Refining the taxonomy of food defence threats

L Manning - Trends in Food Science & Technology, 2019 - Elsevier
Background Awareness of the need to address food defence is gaining pace in the food
industry. Indeed implementing an effective food defence strategy is a key pre-requisite to …

Biometric security in Internet of Things based system against identity theft attacks

GH Sai, AK Tyagi, N Sreenath - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Over the years, the Internet of Things (IoT) has been gaining popularity and is being used
everywhere. The IoT has its applications extended to almost every area of technology …

Investigating identity fraud management practices in e-tail sector: a systematic review

ZA Soomro, J Ahmed, MH Shah… - Journal of Enterprise …, 2019 - emerald.com
Purpose Identity fraud is a growing issue for online retail organisations. The literature on this
issue is scattered, and none of the studies presents a holistic view of identity fraud …

[PDF][PDF] Customer Relationship Management Improvement using IoT Data.

C Ploder, R Bernsteiner, T Dilger, S Huber - IoTBDS, 2021 - pdfs.semanticscholar.org
The Internet of Things (IoT) increasingly gains importance and costumers ale willing to pay
for. Studies show that by 2020, more than 30 billion devices will be connected and the IoT …

Identity theft and financial loss

D Hummer, DJ Rebovich - Handbook on Crime and Technology, 2023 - elgaronline.com
The evidence is overwhelming that identity theft is an increasing problem both globally and
in the United States. Over the past twenty years, data from consumer agencies indicate an …

Securing the internet of things using blockchain

S Showkat, S Qureshi - … on Cloud Computing, Data Science & …, 2020 - ieeexplore.ieee.org
At present, the networks are vulnerable to various security problems like intrusion, phishing,
hacking, to mention a few, and various encryption techniques are employed to curb the …

[PDF][PDF] Threat taxonomy for Cloud of Things

MS Ferdous, R Hussein, M Alassafi… - Internet of Things and …, 2016 - researchgate.net
In the last few years, the cloud computing paradigm experienced a considerable growth,
making it the de-facto technology fuelling almost all major online services. At the same time …