The rise of ransomware and emerging security challenges in the Internet of Things

I Yaqoob, E Ahmed, MH ur Rehman, AIA Ahmed… - Computer Networks, 2017 - Elsevier
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of
Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have …

[PDF][PDF] Literature review of security issues in saas for public cloud computing: a meta-analysis

M Shakir, M Hammood, AK Muttar - International Journal of …, 2018 - academia.edu
Cloud computing is a rapidly growing technology due to its highly flexible uses and
applications. It also has other features such as simplicity, quick data access and reduced …

Ransomware and internet of things: A new security nightmare

SR Zahra, MA Chishti - … on cloud computing, data science & …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has dramatically revolutionized different aspects of living over the
past few years. IoT is a huge network of devices that are able to sense and hold sensitive …

Cultural heritage and internet of things

EMA González, E Municio, MN Alemán… - Proceedings of the 6th …, 2020 - dl.acm.org
Ancient structures and historical buildings represent invaluable assets for future
generations. They need to be preserved as much as possible since, as cultural heritage …

Interacting with heritage: On the use and potential of IoT within the cultural heritage sector

MT Marshall - 2018 Fifth International Conference on Internet …, 2018 - ieeexplore.ieee.org
This paper discusses the potential for the use of IoT technologies within cultural heritage,
including the creation of new interactive experiences, visit personalisation, visitor data …

Implementing security and trust in IoT/M2M using middleware

SD Castilho, EP Godoy… - … Conference on Information …, 2020 - ieeexplore.ieee.org
Machine to Machine (M2M) a sub area of Internet of Things (IoT) will link billions of devices
or things distributed around the world using the Internet. These devices when connected …

[PDF][PDF] Information security of the Internet of Things

A Nazarov, D Nazarov, Ș Ţălu - Proceedings of the International …, 2021 - scitepress.org
At present, the impact of “computer-computer” interaction on functional reliability of the
systems that ensure the well-being of society is of great theoretical and practical interest …

A theoretical framework for telecom Internet of Things in developing countries

MA Areqi, MN Ali, AT Zahary - 2021 International Conference of …, 2021 - ieeexplore.ieee.org
the Internet of things (IoT) works through different types of communication networks.
Providing IoT services by operators will bring benefits to IoT and operators alike. Operators …

[PDF][PDF] IoT Contact: A Strategy for Predicting Contagious IoT Nodes in Mitigating Ransomware Attacks

M Ibrahim, MT Abdullah, A Abdullah… - Turkish Journal of …, 2021 - academia.edu
Although the emergence of the Internet of Things (IoT) can facilitate various aspects of
people's lives, most IoT devices are vulnerable to ransomware attacks. Ransomware attacks …

Investigating Fog-and Cloud-based Control Loops for Future Smart Factories

D Ismahil - 2017 - diva-portal.org
The wide use of the cloud computing and its services has drawn everybody's attention to the
concept. There are many reasons for its growing popularity and some of the advantages are …