M Abomhara, GM Køien - Journal of Cyber Security …, 2015 - journals.riverpublishers.com
… Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and … to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has …
RJ Raimundo, AT Rosário - Applied Sciences, 2022 - mdpi.com
… keyword “CyberSecurity”, and this was reduced to 1316 by adding the keyword “Internet of Things”… aims to identify the main research keywords “CyberSecurity” and “Internet of Things”. …
… IoT cybersecurity risk management, this paper presents a literature review on IoT security technologies and cyber risk management frameworks and develops a four-layer IoT cyber risk …
M Lackner, E Markl, M Aburaia - Journal of Information Technology …, 2018 - researchgate.net
… The Internet Society states that “as a catchword, cybersecurity is frighteningly inexact and can stand for an almost endless list of different security concerns, technical challenges, and ‘…
… in meeting the security needs of energy domains in the 21st century. In this paper, we propose a cybersecurity framework capable of providing adequate security and privacy, and …
… In this study, we propose an architecture model for cybersecurity threats and protection … ware threats are the main challenges in the field of cybersecurity using IoT-based big data. We …
A Abdullah, R Hamad, M Abdulrahman… - … Information Security …, 2019 - ieeexplore.ieee.org
… (IoT) revolution is becoming the focus of research, and both security … cybersecurity state in IoT domain along with its security challenges are discussed, also we address some security …
M Kuzlu, C Fair, O Guler - Discover Internet of things, 2021 - Springer
… This review paper covers a variety of topics regarding cybersecurity, the Internet of Things (IoT), Artificial Intelligence (AI), and how they all relate to each other in three survey-style …
… Good cybersecurity practices make it possible to avoid damage to production lines and … of security, this paper aims to carry out a review of existing technologies about cybersecurity in …