Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT

F James, I Ray, D Medhi - NOMS 2023-2023 IEEE/IFIP …, 2023 - ieeexplore.ieee.org
In the domain of IoT security management, we consider attack vulnerabilities and how to
identify those so as to prevent attacks from spreading. More specifically, inspired by this …

Quantifying impact on safety from cyber-attacks on cyber-physical systems

E Vlahakis, G Provan, G Werner, S Yang… - IFAC-PapersOnLine, 2023 - Elsevier
We propose a novel framework for modeling attack scenarios in cyber-physical control
systems: we represent a cyber-physical system as a constrained switching system, where a …

Role of Finite State Automata in Transliterating Latin Script into Javanese Script

S Suprihatin, I Riadi, F Furizal… - … Informatika: Jurnal Ilmu … - journals.ums.ac.id
Writing Javanese script is considered complicated and difficult for people who learn it. The
process of transliterating Latin into Javanese script cannot be done directly, because each …

[图书][B] Security Management of Smart Home Internet-Of-Things: A Framework, Finite-State Attack Modeling, and Worst Attack Vulnerability Analysis

F James - 2023 - search.proquest.com
Abstract Smart Home Internet of Things (SHIoT) provides a rich compendium of innovative,
ubiquitous, and interactive services to users using a variety of smart sensors, devices and …

Система профілювання вразливостей при керуванні розумним будинком

ОО Савчук - 2022 - elar.khmnu.edu.ua
Анотація Об'єктом дослідження є структурний синтез підсистем первинних
перетворювачів. Предметом дослідження є методи структурного синтезу підсистем …