Protecting iot servers against flood attacks with the quasi deterministic transmission policy

E Gelenbe, M Nasereddin - … on Trust, Security and Privacy in …, 2023 - ieeexplore.ieee.org
Servers at Supply Chains and othet Cyber-physical systems that receive packets from IoT
devices should meet the QoS needs of incoming packets, and protect the system from …

Exploring killer domains to create new value: A comparative case study of Canadian and Korean telcos

C Lim, J Rowsell, S Kim - Telecommunications Policy, 2024 - Elsevier
Diversifying business portfolios and creating new value has been considered essential
strategy for telecommunications companies (telcos) to survive and grow. To successfully …

Autonomic security management for IoT smart spaces

C Lin, H Khazaei, A Walenstein, A Malton - ACM Transactions on …, 2021 - dl.acm.org
Embedded sensors and smart devices have turned the environments around us into smart
spaces that could automatically evolve, depending on the needs of users, and adapt to the …

Intelligence Sparse Sensor Network for Automatic Early Evaluation of General Movements in Infants

B Bao, S Zhang, H Li, W Cui, K Guo, Y Zhang… - Advanced …, 2024 - Wiley Online Library
General movements (GMs) have been widely used for the early clinical evaluation of infant
brain development, allowing immediate evaluation of potential development disorders and …

Transparent security method for automating IoT security assessments

R Kaksonen, K Halunen, M Laakso… - … Conference on Information …, 2023 - Springer
People and businesses are dependent on the security of the Internet of Things (IoT). Vendor-
independent security assessment and certification intends to provide an objective view of …

An IoT/IoMT security testbed for anomaly-based intrusion detection systems

G Zachos, G Mantas, I Essop… - 2023 IFIP …, 2023 - ieeexplore.ieee.org
Over the past few years, the Internet of Things (IoT) is transforming the healthcare sector
through the introduction of the Internet of Medical Things (IoMT) technology whose purpose …

Automating IoT Security Standard Testing by Common Security Tools

R Kaksonen, K Halunen, M Laakso… - Proceedings of the 10th …, 2024 - oulurepo.oulu.fi
Cybersecurity standards play a vital role in safeguarding the Internet of Things (IoT).
Currently, standard compliance is assessed through manual reviews by security experts, a …

A network-independent tool-based usable authentication system for Internet of Things devices

C Jung, J Choi, R Jang, D Mohaisen, DH Nyang - Computers & Security, 2021 - Elsevier
In this paper, we introduce a hardware-based system with a protocol realization to
authenticate Internet of Things (IoT) devices. DigitalSeal is a novel standalone network …

Towards a software‐defined networking model for consumer‐centric content delivery network for IoT

S Bhardwaj, S Harit, A Yadav - Transactions on Emerging …, 2024 - Wiley Online Library
Every entity must communicate seamlessly in an interconnected network. Personalised
delivery of information in an open private network (s) among consumers should be …

Automatic generation of threat paths in internet of things‐based systems

MA Ramazanzadeh, B Barzegar… - IET …, 2022 - Wiley Online Library
Today,'security challenge'is considered a commonly‐used catchword when it comes to
emerging technologies such as the internet of things (IoT). Turning a blind eye to this …