Remote exploitation attacks use software vulnerabilities to penetrate through a network of Internet of Things (IoT) devices. This work addresses defending against remote exploitation …
Recent advances in cyber-physical systems, artificial intelligence, and cloud computing have driven the widespread deployment of Internet-of-Things (IoT) devices in smart homes …
In recent years, Internet of Things (IoT) devices have been extensively deployed in edge networks, including smart homes and offices. Despite the exciting opportunities afforded by …
Recent developments in information and communication technologies related to computer networks, embedded systems, and artificial intelligence have led to the emergence of a new …
Mobile systems, such as smartphones, wearables (eg, smartwatches, AR/VR headsets), and IoT devices, have come a long way from being just a method of communication to …
With the ever-growing reliance on IoT-enabled sensors to age in place, a need arises to protect them from malicious activities by detecting attacks or other anomalies. In this work …
Many home users nowadays use various smart devices to improve the efficiency and convenience of their home environments. Trigger-action platforms such as “If-This-Then …
Abstract Internet of Things (IoT) has grown rapidly in the last decade and continues to expand offering a wide range of devices to support a diverse set of applications. With …
Trigger-Action Platforms (TAPs) enable users without programming experience to personalize the behavior of Internet of Things applications and services through IF-THEN …