The rise of ransomware and emerging security challenges in the Internet of Things
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …
[PDF][PDF] Literature review of security issues in saas for public cloud computing: a meta-analysis
Cloud computing is a rapidly growing technology due to its highly flexible uses and
applications. It also has other features such as simplicity, quick data access and reduced …
applications. It also has other features such as simplicity, quick data access and reduced …
Ransomware and internet of things: A new security nightmare
SR Zahra, MA Chishti - … on cloud computing, data science & …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has dramatically revolutionized different aspects of living over the
past few years. IoT is a huge network of devices that are able to sense and hold sensitive …
past few years. IoT is a huge network of devices that are able to sense and hold sensitive …
Cultural heritage and internet of things
EMA González, E Municio, MN Alemán… - Proceedings of the 6th …, 2020 - dl.acm.org
Ancient structures and historical buildings represent invaluable assets for future
generations. They need to be preserved as much as possible since, as cultural heritage …
generations. They need to be preserved as much as possible since, as cultural heritage …
Interacting with heritage: On the use and potential of IoT within the cultural heritage sector
MT Marshall - 2018 Fifth International Conference on Internet …, 2018 - ieeexplore.ieee.org
This paper discusses the potential for the use of IoT technologies within cultural heritage,
including the creation of new interactive experiences, visit personalisation, visitor data …
including the creation of new interactive experiences, visit personalisation, visitor data …
Implementing security and trust in IoT/M2M using middleware
SD Castilho, EP Godoy… - … Conference on Information …, 2020 - ieeexplore.ieee.org
Machine to Machine (M2M) a sub area of Internet of Things (IoT) will link billions of devices
or things distributed around the world using the Internet. These devices when connected …
or things distributed around the world using the Internet. These devices when connected …
[PDF][PDF] Information security of the Internet of Things
At present, the impact of “computer-computer” interaction on functional reliability of the
systems that ensure the well-being of society is of great theoretical and practical interest …
systems that ensure the well-being of society is of great theoretical and practical interest …
A theoretical framework for telecom Internet of Things in developing countries
the Internet of things (IoT) works through different types of communication networks.
Providing IoT services by operators will bring benefits to IoT and operators alike. Operators …
Providing IoT services by operators will bring benefits to IoT and operators alike. Operators …
[PDF][PDF] IoT Contact: A Strategy for Predicting Contagious IoT Nodes in Mitigating Ransomware Attacks
Although the emergence of the Internet of Things (IoT) can facilitate various aspects of
people's lives, most IoT devices are vulnerable to ransomware attacks. Ransomware attacks …
people's lives, most IoT devices are vulnerable to ransomware attacks. Ransomware attacks …
Investigating Fog-and Cloud-based Control Loops for Future Smart Factories
D Ismahil - 2017 - diva-portal.org
The wide use of the cloud computing and its services has drawn everybody's attention to the
concept. There are many reasons for its growing popularity and some of the advantages are …
concept. There are many reasons for its growing popularity and some of the advantages are …