A survey on supply chain security: Application areas, security threats, and solution architectures

V Hassija, V Chamola, V Gupta, S Jain… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The rapid improvement in the global connectivity standards has escalated the level of trade
taking place among different parties. Advanced communication standards are allowing the …

Survey of dos/ddos attacks in iot

R Khader, D Eleyan - Sustainable Engineering and Innovation, 2021 - sei.ardascience.com
The term internet of things (IoT) has gained much popularity in the last decade, which can be
defined as various connected devices over the internet. IoT has rapidly spread to include all …

Threats and countermeasures of cyber security in direct and remote vehicle communication systems

S Bharati, P Podder, M Mondal, MRA Robel - arXiv preprint arXiv …, 2020 - arxiv.org
Traffic management, road safety, and environmental impact are important issues in the
modern world. These challenges are addressed by the application of sensing, control and …

Information security risk items and management practices for mobile payment using non-financial-institution service providers: An exploratory study

SY Huang, T Wang, YT Huang, TN Yeh - International Journal of …, 2024 - Elsevier
Mobile payment has become increasingly popular in recent years. However, concerns
remain about the information security risk management practices implemented by non …

IoT parking apps with car plate recognition for smart city using node red

MSBM Nazri, TLAFB Tengku, L Gaafar… - … on information and …, 2020 - ieeexplore.ieee.org
This project is using a recognition method to determine the plate number of the rear part of
the car, whenever the car approaches the gate entrance. A camera is used to capture the …

Aggregation of Risk Management and Non-Parametric Models to Rank Failure Modes of Radio Frequency Identification Systems

K Chnina, S Daneshvar - Applied Sciences, 2024 - mdpi.com
Featured Application The method is applied to the RFID system but can be implemented to
assess the risks of any other equipment or process. Abstract The failure mode causes and …

Internet of things security requirements, threats, attacks, and countermeasures

M Abdel-Basset, N Moustafa, H Hawash… - … learning techniques for …, 2022 - Springer
This chapter elaborates on different security aspects to be taken into accounts during the
development and the deployments of IoT architecture. To make the reader about the security …

Biometric passport security based on face recognition and biometric encryption using secure force algorithm into the HCC2D code

ZH Choudhury - Information Security Journal: A Global Perspective, 2024 - Taylor & Francis
This paper proposed a noble face recognition and biometric encryption technique for the
biometric passport by applying encrypted biometric data encoded into the High-Capacity …

Security analysis and a potential layer to layer security solution of medical cyber-physical systems

MH Raju, MU Ahmed… - A Handbook of Internet of …, 2020 - Springer
Abstract Cyber-Physical Systems (CPS) is feedback systems that are a concoction of closely
integrated physical processes, communication and computation which interacts with the …

[PDF][PDF] Multimodal access control system combining RFID, fingerprint and facial recognition

M El Beqqal, M Azizi, JL Lanet - Indones. J. Electr. Eng …, 2020 - pdfs.semanticscholar.org
Monomodal biometry does not constitute an effective measure to meet the desired
performance requirements for large-scale applications, due to limitations such as noisy data …