Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services

I Stellios, K Mokos, P Kotzanikolaou - Connection Science, 2022 - Taylor & Francis
Internet-of-Things (IoT) extends the provision of remotely managed services across different
domains. At the same time, IoT devices primarily designed for home environments may also …

Deep Learning-Inspired IoT-IDS Mechanism for Edge Computing Environments

A Aldaej, TA Ahanger, I Ullah - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) technology has seen substantial research in Deep Learning (DL)
techniques to detect cyberattacks. Critical Infrastructures (CIs) must be able to quickly detect …

A comprehensive node-based botnet detection framework for IoT network

A Aldaej, TA Ahanger, M Atiquzzaman, I Ullah - Cluster Computing, 2024 - Springer
The number of cyber-attacks targeting the Internet of Things (IoT) has elevated in the last
decade. This is due to the inherent security vulnerabilities inside IoT endpoints, as well as …

A Blockchain-Based Architecture to Manage User Privacy Preferences on Smart Shared Spaces Privately

CV Neu, J Gibson, RC Lunardi, N Leesakul… - … Workshop on Data …, 2022 - Springer
Smart shared spaces, such as smart buildings, represent a fast-growing market and can
benefit from several sensors that generate data which can be used to improve …

IoT-Traffic Video Surveillance System for Weapon Detection

R Thirukkumaran, N Sivabalan, R Jaya… - … on Power, Energy …, 2022 - ieeexplore.ieee.org
In the previous few years, multimedia traffic has significantly increased. The Internet of
Things (IoT) introduces new traffic and applications. SDNs improve network administration …

Illuminating threats: Exploring cybersecurity threats in smart bulbs and illuminating a path to enhanced protection

F Formosinho - 2024 - diva-portal.org
There are serious security risks with the growing use of IoT devices. Historically,
manufacturers prioritized profit over security due to high demand, a perspective that has …

Αναγνώριση, μοντελοποίηση και αξιολόγηση κυβερνο-φυσικών μονοπατιών επίθεσης προερχόμενα από το Διαδίκτυο των Πραγμάτων, κατά κρίσιμων υποδομών και …

Ι Στέλλιος - 2022 - dione.lib.unipi.gr
Οι Κρίσιμες Υποδομές (ΚΥ) διαδραματίζουν ζωτικό ρόλο για την ευημερία της κοινωνίας μας,
ενώ οποιαδήποτε διαταραχή των υπηρεσιών που προσφέρουν έχει σημαντικές επιπτώσεις …

A Blockchain-Based Architecture to Manage User Privacy Preferences on Smart Shared Spaces Privately

C Morisset - … ESORICS 2022 International Workshops, DPM 2022 …, 2023 - books.google.com
Smart shared spaces, such as smart buildings, represent a fast-growing market and can
benefit from several sensors that generate data which can be used to improve …

Vulnerability assessment of IoT-based Smart Lighting Systems

S Zafar - 2022 - diva-portal.org
This study addresses the significant gap in literature regarding the security risks of smart
lighting systems integrated within the Internet of Things (IoT) in commercial-industrial …