Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design

JBF Sequeiros, FT Chimuco, MG Samaila… - ACM Computing …, 2020 - dl.acm.org
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …

[HTML][HTML] Model-based security testing in IoT systems: A Rapid Review

F Lonetti, A Bertolino, F Di Giandomenico - Information and Software …, 2023 - Elsevier
Context: Security testing is a challenging and effort-demanding task in IoT scenarios. The
heterogeneous devices expose different vulnerabilities that can influence the methods and …

A survey of IoT protocols and their security issues through the lens of a generic IoT stack

J Tournier, F Lesueur, F Le Mouël, L Guyon… - Internet of Things, 2021 - Elsevier
Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its
wireless technology. These security issues are challenging because IoT protocols are …

Automated security risk identification using AutomationML-based engineering data

M Eckhart, A Ekelhart, E Weippl - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Systems integrators and vendors of industrial components need to establish a security-by-
design approach, which includes the assessment and subsequent treatment of security …

Approaches and challenges in Internet of robotic things

A Sayeed, C Verma, N Kumar, N Koul, Z Illés - Future Internet, 2022 - mdpi.com
The Internet of robotic things (IoRT) is the combination of different technologies including
cloud computing, robots, Internet of things (IoT), artificial intelligence (AI), and machine …

[HTML][HTML] Performance evaluation of LSTM neural networks for consumption prediction

DG da Silva, MTB Geller, MS dos Santos Moura… - e-Prime-Advances in …, 2022 - Elsevier
Energy consumption and energy efficiency are topics that have attracted the attention of
researchers in recent years, in order to seek sustainable solutions for energy production and …

IoTsecM: a UML/SysML extension for internet of things security modeling

PJ Escamilla-Ambrosio, DA Robles-Ramírez… - Ieee …, 2021 - ieeexplore.ieee.org
In this paper, an approach referred to as IoTsecM is proposed. This proposal is a
UML/SysML extension for security requirements modeling within the analysis stage in a …

Supply chain management serious game using blockchain smart contract

AN Putri, M Hariadi, RF Rachmad - IEEE Access, 2023 - ieeexplore.ieee.org
Smart Contract and Blockchain are necessary for transactions in supply chain management.
A smart contract is an agreement in the form of a cryptographic code digitally signed by the …

[PDF][PDF] A Study of Modelling IoT Security Systems with Unified Modelling Language (UML)

H Meziane, N Ouerdi - … Journal of Advanced Computer Science and …, 2022 - academia.edu
The Internet of Things (IoT) has emerged as a technology with the application in different
areas. Hence, security is one of the major challenges that has the potential to stifle the …

Internet del Futuro–Estudio de tecnologías IoT

L González, AAO Sofia, D Laguía… - Informe Científico …, 2020 - dialnet.unirioja.es
Este trabajo proporciona una visión general del paradigma Internet de las Cosas (IoT)
apuntando a las aplicaciones, arquitecturas, protocolos, tecnologías, y problemas …