AI-enabled IoT penetration testing: state-of-the-art and research challenges

C Greco, G Fortino, B Crispo… - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT Internet of Things (IoT) is gaining importance as its applications are found in
many critical infrastructure sectors (eg, Industry 4.0, healthcare, transportation, and …

[HTML][HTML] Model-based security testing in IoT systems: A Rapid Review

F Lonetti, A Bertolino, F Di Giandomenico - Information and Software …, 2023 - Elsevier
Context: Security testing is a challenging and effort-demanding task in IoT scenarios. The
heterogeneous devices expose different vulnerabilities that can influence the methods and …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

Identifying the attack surface for IoT network

S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi - Internet of Things, 2020 - Elsevier
For this research, our primary goal is to define an attack surface for networks utilizing the IoT
(Internet of Things) devices. The IoT consists of systems of integrated objects, computing …

Artificial neural networks-based intrusion detection system for internet of things fog nodes

J Pacheco, VH Benitez, LC Felix-Herran… - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a mean to share resources (memory, storage
computational power, data, etc.) between computers and mobile devices, as well as …

PatrIoT: practical and agile threat research for IoT

E Süren, F Heiding, J Olegård, R Lagerström - International Journal of …, 2023 - Springer
Abstract The Internet of things (IoT) products, which have been widely adopted, still pose
challenges in the modern cybersecurity landscape. Many IoT devices are resource …

Integration of IoT and Blockchain to in the Processes of a University Campus

W Villegas-Ch, X Palacios-Pacheco… - Sustainability, 2020 - mdpi.com
Currently, universities, as centers of research and innovation, integrate in their processes
various technologies that allow improving services and processes for their members. Among …

CT-IoT: a combinatorial testing-based path selection framework for effective IoT testing

L Hu, WE Wong, DR Kuhn, RN Kacker, S Li - Empirical Software …, 2022 - Springer
Abstract Testing Internet of Things (IoT) systems is challenging. This is not only because of
the various aspects of IoT systems, such as software, hardware, and network that need to be …

Proposal for an implementation guide for a computer security incident response team on a university campus

W Villegas-Ch, I Ortiz-Garcés, S Sánchez-Viteri - Computers, 2021 - mdpi.com
Currently, society is going through a health event with devastating results. In their desire to
control the 2019 coronavirus disease, large organizations have turned over the execution of …

Analytical review of cybersecurity for embedded systems

A Aloseel, H He, C Shaw, MA Khan - IEEE Access, 2020 - ieeexplore.ieee.org
To identify the key factors and create the landscape of cybersecurity for embedded systems
(CSES), an analytical review of the existing research on CSES has been conducted. The …