I Indre, C Lemnaru - 2016 IEEE 12th International Conference …, 2016 - ieeexplore.ieee.org
… We encountered some challenges also while trying to understand how cyber-attacks occur. We selected subtypes of attacks and studied their anatomy in order to be able to reproduce …
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives. The deployment of a large number of objects adhered to the internet has unlocked the …
J Slupska, LM Tanczer - … of technology-facilitated violence and abuse, 2021 - emerald.com
… (ie, societal) but also cybersecurity (ie, technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurityattacks, to shift the …
GW Jackson Jr, S Rahman - arXiv preprint arXiv:1908.00666, 2019 - arxiv.org
… cybersecurityattacks the same as any internet-enabled device might experience [2, 3, 5, 6, 7, 8, 28]. This study examined the question: How are the cybersecurity … for the cybersecurity […
C Iwendi, SU Rehman, AR Javed, S Khan… - … on Internet Technology …, 2021 - dl.acm.org
… the security of devices from digital attacks. Recognition of new … cyber-attacks in the business domain include minor attacks … for detecting cyber-attacks on the Internet of Things using a …
… 6 represents various cybersecurityattacks that can impact IoT layers such as the Perception layer, Support layer, Network layer, and Application layer. A widely accepted fourlayered …
MB Dissanayake - International Journal of wireless and …, 2021 - researchgate.net
… The research presented in this paper, predicts the most common five types of cyber-attacks … cyber-attacks. Furthermore, we analyze the feature importance in detecting an attack. By …
PT Ganai, A Bag, A Sable, KH Abdullah… - 2022 2nd …, 2022 - ieeexplore.ieee.org
… , hospital instruments and medical waste tracing, blood managing, infection prevention and control, and many other things are all linked to IoT cybersecurity in the medical business. …
… a cyber-security concern across all organization technologies, and IoT devices could represent the latest attack … Although it is one of the common forms of cyber-securityattacks, it can be …