[HTML][HTML] A review of security concerns in Internet of Things

E Leloglu - Journal of Computer and Communications, 2017 - scirp.org
The Internet of Things (IoT) represents a technologically optimistic future where objects will
be connected to the internet and make intelligent collaborations with other objects …

[PDF][PDF] Internet of things: Genesis, challenges and applications

P Matta, B Pant - Journal of Engineering Science and …, 2019 - jestec.taylors.edu.my
As of now, we are in an age where every object is a smart object. A smart object is an object
that has embedded electronics and connected to the internet. In other words, specifically, we …

Situational access control in the internet of things

R Schuster, V Shmatikov, E Tromer - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Access control in the Internet of Things (IoT) often depends on a situation---for example," the
user is at home''---that can only be tracked using multiple devices. In contrast to the (well …

Security, cybercrime and digital forensics for IoT

HF Atlam, A Alenezi, MO Alassafi, AA Alshdadi… - Principles of internet of …, 2020 - Springer
Abstract The Internet of Things (IoT) connects almost all the environment objects whether
physical or virtual over the Internet to produce new digitized services that improve people's …

[HTML][HTML] IoT security and computation management on a multi-robot system for rescue operations based on a cloud framework

S Roy, T Vo, S Hernandez, A Lehrmann, A Ali… - Sensors, 2022 - mdpi.com
There is a growing body of literature that recognizes the importance of Multi-Robot
coordination and Modular Robotics. This work evaluates the secure coordination of an …

IoT security and privacy issues

A Assiri, H Almagwashi - 2018 1st International Conference on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) represents the future of technology where objects will be able to
communicate with each other and connect to the internet to create self-configuration …

A comparative analyses of current IoT middleware platforms

O Toutsop, K Kornegay, E Smith - 2021 8th International …, 2021 - ieeexplore.ieee.org
Technology is evolving exponentially, and researchers are seeking solutions to answer
questions related to the benefits of using advanced IoT cloud computing platforms. There is …

DNS Records Secure Provisioning Mechanism for Virtual Machines automatic management in high density data centers

CV Marian - 2021 IEEE International Black Sea Conference on …, 2021 - ieeexplore.ieee.org
Nowadays is becoming trivial to have multiple virtual machines working in parallel on
hardware platforms with high processing power. This appropriate cost effective approach …

Wdtf: A technique for wireless device type fingerprinting

AK Dalai, SK Jena - Wireless Personal Communications, 2017 - Springer
In this Work, a technique for wireless device type fingerprinting has been introduced. The
technique utilizes the information that revealed as a result of the homogeneity in devices of …

Cyber-attacks–the impact over airports security and prevention modalities

G Suciu, A Scheianu, A Vulpe, I Petre… - Trends and Advances in …, 2018 - Springer
In recent years, we have witnessed an improvement of the systems developed for the
prevention of cyber-attacks meant to harm the airports security, due to the increasing …