A Secure and Reliable Device Access Control Scheme for IoT based Monitoring Systems

D Paikaray, J Gandhi - 2022 5th International Conference on …, 2022 - ieeexplore.ieee.org
Almost all industries, including engineering, medicine, transportation, and agriculture, are
paying close attention to IoT-based monitoring systems at the moment. To increase the …

A Testbed for Automating and Analysing Mobile Devices and Their Applications

L Simpson, K Millar, A Cheng… - … on Machine Learning …, 2023 - ieeexplore.ieee.org
The need for improved network situational awareness has been highlighted by the growing
complexity and severity of cyber-attacks. Mobile phones pose a significant risk to network …

Spying on Kids' Smart Devices: Beware of Security Vulnerabilities!

MA Hannan Bin Azhar, D Smith, A Cain - … in the Age of Smart Societies …, 2023 - Springer
The emergence of the Internet of Things devices in everyday life has increased its sales
dramatically over recent years, specifically of smart devices, such as smartwatches, fitness …

User Authentication in the IoT and IIoT Environment

A Mahfouz - Smart and Agile Cybersecurity for IoT and IIoT …, 2024 - igi-global.com
This chapter delves deep into the issue of user authentication in the environment of the
internet of things (IoT) and industrial internet of things (IIoT). It's a journey defined by security …

Design and Realization of Fully Automatic Pump Performance Test System

Q Li, DH Wu, DZ Yang, MH Fei, Y Song… - International Journal of …, 2024 - Trans Tech Publ
With the development of automation technology, it gradually replaces manual labor in
various fields. Pumps are widely used in various production processes in the industrial field …

Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature Selection

D Rajput, DK Sharma, M Gupta - … on Cryptology & Network Security with …, 2023 - Springer
IoT devices are physical things that have sensors, network connectivity, and software built
into them. This allows them to gather data and share it with other systems and devices. The …

AI Enabled IoT Network Traffic Fingerprinting with Locality Sensitive Hashing

J Thom - 2024 - scholarworks.unr.edu
The ubiquity of IoT devices in both public and private networks has increased dra-matically
in the last few years with billions of network-connected devices appear-ing in every sector. In …

[PDF][PDF] Forensic analysis on false data injection attack on IoT environment

SAS Nizam, ZA Ibrahim, FA Rahim, HS Fadzil… - International Journal of …, 2021 - core.ac.uk
False Data Injection Attack (FDIA) is an attack that could compromise Advanced Metering
Infrastructure (AMI) devices where an attacker may mislead real power consumption by …

IIoT processing analysis model for improving efficiency and processing time through characteristic analysis by production product

YS Jeong, YT Kim - Journal of Digital Convergence, 2022 - koreascience.kr
Recently, in the industrial field, various studies are being conducted on converging IIoT
devices that combine low-power processes and network cards into industrial sites to …

An optimized neural network for prediction of security threats on software testing

Suman, RA Khan - 2024 - dl.acm.org
Software testing involves evaluating and confirming a software program or product to ensure
it operates according to its intended functionality. Testing offers advantages like bug …