IoT reliability: a review leading to 5 key research directions
Abstract The Internet of Things (IoT) is rapidly changing the way in which we engage with
technology on a daily basis. The IoT paradigm enables low-resource devices to …
technology on a daily basis. The IoT paradigm enables low-resource devices to …
Static analysis of information systems for IoT cyber security: a survey of machine learning approaches
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …
their software. One of the most in-demand methods that has repeatedly been proven to be …
Anomaly detection in aerial videos with transformers
Unmanned aerial vehicles (UAVs) are widely applied for purposes of inspection, search,
and rescue operations by the virtue of low-cost, large-coverage, real-time, and high …
and rescue operations by the virtue of low-cost, large-coverage, real-time, and high …
Cyber-risks in the industrial internet of things (IIoT): towards a method for continuous assessment
Continuous risk monitoring is considered in the context of cybersecurity management for the
Industrial Internet-of-Thing. Cyber-risk management best practice is for security controls to …
Industrial Internet-of-Thing. Cyber-risk management best practice is for security controls to …
Smart home IoT anomaly detection based on ensemble model learning from heterogeneous data
Nowadays, internet based home automation is made possible with the advent of intelligent
device control. These electronic sensing devices transfer an enormous amount of data into …
device control. These electronic sensing devices transfer an enormous amount of data into …
Requirements and recommendations for IoT/IIoT models to automate security assurance through threat modelling, security analysis and penetration testing
R Ankele, S Marksteiner, K Nahrgang… - Proceedings of the 14th …, 2019 - dl.acm.org
The factories of the future require efficient interconnection of their physical machines into the
cyber space to cope with the emerging need of an increased uptime of machines, higher …
cyber space to cope with the emerging need of an increased uptime of machines, higher …
Blockchain-based security layer for identification and isolation of malicious things in IoT: A conceptual design
M Banerjee, J Lee, Q Chen… - 2018 27th International …, 2018 - ieeexplore.ieee.org
Internet-of-Things (IoT) is increasingly becoming the norm in both civilian and military
settings. In this paper, we present a comprehensive security abstraction layer for IoT systems …
settings. In this paper, we present a comprehensive security abstraction layer for IoT systems …
Event correlation in the integrated cyber-physical security system
IV Kotenko, DS Levshun… - 2016 XIX IEEE …, 2016 - ieeexplore.ieee.org
The paper considers approaches to the integration of heterogeneous data sources and
correlations of disparate security events for protection against cyber-physical attacks. The …
correlations of disparate security events for protection against cyber-physical attacks. The …
A hardware-assisted heartbeat mechanism for fault identification in large-scale iot systems
M Banerjee, C Borges, KKR Choo, J Lee… - … on Dependable and …, 2020 - ieeexplore.ieee.org
With increased inter-connectivity among disparate devices, such as Internet-of-Things (IoT)
devices, including those deployed in a nation's critical infrastructure, there is a need to …
devices, including those deployed in a nation's critical infrastructure, there is a need to …
Underpinning Quality Assurance: Identifying Core Testing Strategies for Multiple Layers of Internet-of-Things-Based Applications
The Internet of Things (IoT) constitutes a digitally integrated network of intelligent devices
equipped with sensors, software, and communication capabilities, facilitating data exchange …
equipped with sensors, software, and communication capabilities, facilitating data exchange …