… security issues with a focus on the SmartHome and City environments. We discuss possible … for improving IoT security that not only focus on today's endpoint device security issues, but …
BC Chifor, SC Arseni, I Matei… - … Systems and Computer …, 2019 - ieeexplore.ieee.org
… For securing the user management commands, we propose encapsulating the actuation … a security framework for SmartHome, our contribution being twofold: we propose a Secure …
… In this study, we propose an architecture model for cybersecurity threats and protection … in the field of cybersecurityusing IoT-based big data. We proposed a combined deep learning-…
R Rawat, V Mahor, S Chirgaiya, B Garg - … -IoT Based Critical-Applications …, 2021 - Springer
… computerprotection, which could unintentionally risk data from populace falling into the hands of cyber … ], for example, absence of prepared and guaranteed surveillance able just as not …
AM Gamundani, A Phillips… - … on Internet of Things …, 2018 - ieeexplore.ieee.org
… informationsecurity, physical security and management … the Internet [13], they can easily be compromised if the very devices are not secured properly causing an extension of the attack …
D Chauhan, C Singh, D Kudande… - … for the Dark Web and Illicit …, 2022 - igi-global.com
… ing to the Internet of Things (IoT) network by using an algorithm that secures them from unauthorized access. A similar method was used by Meidanet et al. (2017), which classifies the …
… So the need to test homenetworksecurity can increase with the growing adoption of smart home IoT devices. … are a serious threat to IoT security if they are not properly secured. …
M Aly, F Khomh, M Haoues, A Quintero, S Yacout - Internet of Things, 2019 - Elsevier
… will need to be protected to maintain the secure transmission of data between objects. As this … Currently used policies in the computer and networksecurity fields may not be applicable …
S Singh, IH Ra, W Meng, M Kaur… - International Journal of …, 2019 - journals.sagepub.com
… Blockchain has an immutable public record of data which is secured by peer-to-peer … proposed architecture provides a networkattack detection and response system at smart …