IoT reliability: a review leading to 5 key research directions

SJ Moore, CD Nugent, S Zhang, I Cleland - CCF Transactions on …, 2020 - Springer
Abstract The Internet of Things (IoT) is rapidly changing the way in which we engage with
technology on a daily basis. The IoT paradigm enables low-resource devices to …

Static analysis of information systems for IoT cyber security: a survey of machine learning approaches

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …

Anomaly detection in aerial videos with transformers

P Jin, L Mou, GS Xia, XX Zhu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are widely applied for purposes of inspection, search,
and rescue operations by the virtue of low-cost, large-coverage, real-time, and high …

Cyber-risks in the industrial internet of things (IIoT): towards a method for continuous assessment

C Adaros Boye, P Kearney, M Josephs - Information Security: 21st …, 2018 - Springer
Continuous risk monitoring is considered in the context of cybersecurity management for the
Industrial Internet-of-Thing. Cyber-risk management best practice is for security controls to …

Smart home IoT anomaly detection based on ensemble model learning from heterogeneous data

S Tang, Z Gu, Q Yang, S Fu - … Conference on Big Data (Big Data …, 2019 - ieeexplore.ieee.org
Nowadays, internet based home automation is made possible with the advent of intelligent
device control. These electronic sensing devices transfer an enormous amount of data into …

Requirements and recommendations for IoT/IIoT models to automate security assurance through threat modelling, security analysis and penetration testing

R Ankele, S Marksteiner, K Nahrgang… - Proceedings of the 14th …, 2019 - dl.acm.org
The factories of the future require efficient interconnection of their physical machines into the
cyber space to cope with the emerging need of an increased uptime of machines, higher …

Blockchain-based security layer for identification and isolation of malicious things in IoT: A conceptual design

M Banerjee, J Lee, Q Chen… - 2018 27th International …, 2018 - ieeexplore.ieee.org
Internet-of-Things (IoT) is increasingly becoming the norm in both civilian and military
settings. In this paper, we present a comprehensive security abstraction layer for IoT systems …

Event correlation in the integrated cyber-physical security system

IV Kotenko, DS Levshun… - 2016 XIX IEEE …, 2016 - ieeexplore.ieee.org
The paper considers approaches to the integration of heterogeneous data sources and
correlations of disparate security events for protection against cyber-physical attacks. The …

A hardware-assisted heartbeat mechanism for fault identification in large-scale iot systems

M Banerjee, C Borges, KKR Choo, J Lee… - … on Dependable and …, 2020 - ieeexplore.ieee.org
With increased inter-connectivity among disparate devices, such as Internet-of-Things (IoT)
devices, including those deployed in a nation's critical infrastructure, there is a need to …

Underpinning Quality Assurance: Identifying Core Testing Strategies for Multiple Layers of Internet-of-Things-Based Applications

A Aljaedi, S Siddique, MI Satti, AR Alharbi, M Alotaibi… - Sustainability, 2023 - mdpi.com
The Internet of Things (IoT) constitutes a digitally integrated network of intelligent devices
equipped with sensors, software, and communication capabilities, facilitating data exchange …