[HTML][HTML] Cybersecurity in power grids: Challenges and opportunities

T Krause, R Ernst, B Klaer, I Hacker, M Henze - Sensors, 2021 - mdpi.com
Increasing volatilities within power transmission and distribution force power grid operators
to amplify their use of communication infrastructure to monitor and control their grid. The …

Survey on smart homes: Vulnerabilities, risks, and countermeasures

B Hammi, S Zeadally, R Khatoun, J Nebhen - Computers & Security, 2022 - Elsevier
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized
the way we live and interact with each other as well as with various types of systems and …

Identifying IoT devices and events based on packet length from encrypted traffic

AJ Pinheiro, JM Bezerra, CAP Burgardt… - Computer …, 2019 - Elsevier
Recently, machine learning algorithms have been used to identify Internet of Things (IoT)
devices and events. However, existing proposals may inspect the packet payload, what …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …

A systematic review of the research framework and evolution of smart homes based on the internet of things

Y Sun, S Li - Telecommunication Systems, 2021 - Springer
Abstract The Internet of Things has brought unprecedented technological innovation to
smart homes, but the impact of this change on technology and users is limited and …

An automated and comprehensive framework for IoT botnet detection and analysis (IoT-BDA)

T Trajanovski, N Zhang - IEEE Access, 2021 - ieeexplore.ieee.org
The proliferation of insecure Internet-connected devices gave rise to the IoT botnets which
can grow very large rapidly and may perform high-impact cyber-attacks. The related studies …

Tailoring onion routing to the internet of things: Security and privacy in untrusted environments

J Hiller, J Pennekamp, M Dahlmanns… - 2019 IEEE 27th …, 2019 - ieeexplore.ieee.org
An increasing number of IoT scenarios involve mobile, resource-constrained IoT devices
that rely on untrusted networks for Internet connectivity. In such environments, attackers can …

Secure low latency communication for constrained industrial IoT scenarios

J Hiller, M Henze, M Serror, E Wagner… - 2018 IEEE 43rd …, 2018 - ieeexplore.ieee.org
The emerging Internet of Things (IoT) promises value-added services for private and
business applications. However, especially the industrial IoT often faces tough …

From internet of threats to internet of things: A cyber security architecture for smart homes

J Augusto-Gonzalez, A Collen… - 2019 ieee 24th …, 2019 - ieeexplore.ieee.org
The H2020 European research project GHOST-Safe-Guarding Home IoT Environments with
Personalised Real-time Risk Control-aims to deploy a highly effective security framework for …

Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers

M Zhan, Y Li, H Yang, G Yu, B Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Denial of service (DoS) attacks have increasingly exploited vulnerabilities in algorithms or
implementation methods in application-layer programs. In this type of attack, called CPU …