Automated security assessment for the internet of things

X Duan, M Ge, THM Le, F Ullah, S Gao… - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) based applications face an increasing number of potential security
risks, which need to be systematically assessed and addressed. Expert-based manual …

Edge-HetIoT defense against DDoS attack using learning techniques

SS Mahadik, PM Pawar, R Muthalagu - Computers & Security, 2023 - Elsevier
The heterogeneous nature of the internet-of-thing (IoT) is gaining popularity and,
simultaneously, faces rising security issues. The distributed denial of service (DDoS) attack …

Being Hacked: Understanding Victims' Experiences of {IoT} Hacking

A Rostami, M Vigren, S Raza, B Brown - Eighteenth Symposium on …, 2022 - usenix.org
From light bulbs to smart locks, IoT is increasingly embedded into our homes and lives. This
opens up new vulnerabilities as IoT devices can be hacked and manipulated to cause harm …

Fine-grained access control with user revocation in smart manufacturing

E Gómez-Marín, D Martintoni, V Senni, E Castillo… - Electronics, 2023 - mdpi.com
Collaborative manufacturing is a key enabler of Industry 4.0 that requires secure data
sharing among multiple parties. However, intercompany data-sharing raises important …

Hybrid IoT cyber range

KE Balto, MM Yamin, A Shalaginov, B Katt - Sensors, 2023 - mdpi.com
The use of IoT devices has increased rapidly in recent times. While the development of new
devices is moving quickly, and as prices are being forced down, the costs of developing …

An optimized neural network for prediction of security threats on software testing

RA Khan - Computers & Security, 2024 - Elsevier
Software testing involves evaluating and confirming a software program or product to ensure
it operates according to its intended functionality. Testing offers advantages like bug …

Emerging cyber security challenges after COVID pandemic: a survey

A Choudhary, G Choudhary, K Pareek… - Journal of Internet …, 2022 - orbit.dtu.dk
In 2019, a virus infection, COVID-19, traveled across the oceans, gained foothold in many
countries, and started infecting the citizens of those countries. Soon, this virus was labeled a …

Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming

S Agarwal, A Rashid, J Gardiner - Proceedings of the 15th Workshop on …, 2022 - dl.acm.org
With the advent of modern smart farming and agritech technology, farms are increasingly
becoming an example of a cyber-physical system (CPS). For example, a modern dairy farm …

Lightweight micro-architecture for IoT & FPGA security

R Chakraborty, UK Mondal, A Debnath… - International Journal of …, 2023 - Springer
Cryptographic standards were created with the goal of being able to work on a wide range of
systems. Small computing systems with limited capacity to implement cryptography have …

Measurement based evaluation and mitigation of flood attacks on a lan test-bed

M Nasereddin, M Nakıp… - 2023 IEEE 48th …, 2023 - ieeexplore.ieee.org
The IoT is vulnerable to network attacks, and Intrusion Detection Systems (IDS) can provide
high attack detection accuracy and are easily installed in IoT Servers. However, IDS are …