[PDF][PDF] Development of QoS evaluation algorithm for MQTT protocol with reference to threat model

S Pawar, S Patil - … Journal of Engineering and Advanced Technology …, 2019 - academia.edu
… In case of Quality of Services analysis, it is important to check the request and responses …
This paper refers the threat model which represents the flow of threats for proposed case study

A survey of cybersecurity certification for the internet of things

SN Matheu, JL Hernandez-Ramos… - ACM Computing …, 2020 - dl.acm.org
… In addition, it should be noted that a summary of this analysis is … the vulnerabilities and
threats associated to such assets to … risk model to IoT. For this, authors classify the different …

[PDF][PDF] Development of QoS Evaluation Algorithm for MQTT Protocol

S Pawar, S Patil - academia.edu
… In case of Quality of Services analysis, it is important to check the request and responses …
This paper refers the threat model which represents the flow of threats for proposed case study

[PDF][PDF] Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance Learning.

O Lemeshko, O Yeremenko, M Yevdokymenko… - CPITS II (2), 2021 - ceur-ws.org
… domain will be considered as well as threats and risks related to the IoT devices. … Carlsson,
Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture. In: Galinina O., …

Information security risk assessment

I Kuzminykh, B Ghita, V Sokolov, T Bakhshi - Encyclopedia, 2021 - mdpi.com
… The matrix-based approach of risk analysis links assets, vulnerabilities, threats, and
controls and … Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture. In …

The challenges with Internet of Things security for business

I Kuzminykh, B Ghita, JM Such - International Conference on Next …, 2021 - Springer
… The purpose of the study is to identify and make analysis of … as the main method of protecting
IoT assets with 62% data … Increasing understanding of IoT security risks and threats among …

[PDF][PDF] Information Security Risk Assessment. Encyclopedia 2021, 1, 602–617

I Kuzminykh, B Ghita, V Sokolov, T Bakhshi - 2021 - academia.edu
… The matrix-based approach of risk analysis links assets, vulnerabilities, threats, and
controls and … Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture. In …

[PDF][PDF] Increasing teacher competence in cybersecurity using the EU security frameworks

I Kuzminykh, M Yevdokymenko… - … Journal of Modern …, 2021 - researchgate.net
… showed that for our goal the best suitable approach is a model that consists of two stages …
Carlsson, “Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture”, in …

Defining security requirements with the common criteria: Applications, adoptions, and challenges

N Sun, CT Li, H Chan, BD Le, MZ Islam… - IEEE …, 2022 - ieeexplore.ieee.org
… However, this work [3] focused specifically on IoT products and … the threats on the assets
and the likelihood of the threats being … In summary, extended requirements are expected to be …

How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond

N Sun, CT Li, H Chan, MZ Islam, MR Islam… - Ieee …, 2022 - ieeexplore.ieee.org
… Carlsson, “Analysis of assets for threat risk model in avatar-oriented iot architecture,” in
Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, 2018, pp…