Preventing mqtt vulnerabilities using iot-enabled intrusion detection system

M Husnain, K Hayat, E Cambiaso, UU Fayyaz… - Sensors, 2022 - mdpi.com
The advancement in the domain of IoT accelerated the development of new communication
technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although …

A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …

B Shin, PB Lowry - Computers & Security, 2020 - Elsevier
Given the global increase in crippling cyberattacks, organizations are increasingly turning to
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …

An IoT open source platform for photovoltaic plants supervision

P de Arquer Fernández, MÁF Fernández… - International Journal of …, 2021 - Elsevier
In the present work, the authors propose an IoT solution for photovoltaic plants monitoring
based entirely on Open Source software. The described solution is implemented and …

A review on attack graph analysis for iot vulnerability assessment: challenges, open issues, and future directions

OSMBH Almazrouei, P Magalingam, MK Hasan… - IEEE …, 2023 - ieeexplore.ieee.org
Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of
the domain and the increasing complexity of security threats. This study aims to address the …

The sair-iiot cyber testbed as a service: A novel cybertwins architecture in iiot-based smart airports

N Koroniotis, N Moustafa, F Schiliro… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Rapid technological advancements have resulted in increasingly more efficient and
lightweight devices that, coupled with low-power and wide-range wireless connectivity, have …

A survey on recent advanced research of CPS security

Z Wang, W Xie, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …

RETRACTED ARTICLE: Cloud-and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseases

P Malarvizhi Kumar, CS Hong, G Chandra Babu… - Soft Computing, 2021 - Springer
Abstract Internet of Things (IoT)-enabled e-healthcare applications are contributing more to
the society for providing healthcare monitoring services efficiently in smart environment …

[HTML][HTML] Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM

RA Devi, AR Arunachalam - High-Confidence Computing, 2023 - Elsevier
Internet of things (IoT) has become more popular due to the development and potential of
smart technology aspects. Security concerns against IoT infrastructure, applications, and …

A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks

S Ul Haq, Y Singh, A Sharma, R Gupta… - Discover Internet of Things, 2023 - Springer
IoT and Embedded devices grow at an exponential rate, however, without adequate security
mechanisms in place. One of the key challenges in the cyber world is the security of these …

A lightweight and scalable physical layer attack detection mechanism for the internet of things (IoT) using hybrid security schema

R Fotohi, H Pakdel - Wireless Personal Communications, 2021 - Springer
Abstract The Internet of Things, also known as the IoT, refers to the billions of devices
around the world that are now connected to the Internet, collecting and sharing data. The …