The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures

S Volpert, P Eichhammer, F Held, T Huffert… - Future Generation …, 2023 - Elsevier
Monitoring infrastructures is a key cornerstone for both security and resilience mechanisms,
as well as, infrastructure management helping to ensure availability and reliability. Its …

A security monitoring system for internet of things

V Casola, A De Benedictis, A Riccio, D Rivera… - Internet of Things, 2019 - Elsevier
The wide adoption of the Internet of Things (IoT) paradigm in several application domains
has raised new security issues, which should be carefully taken into account to achieve a …

Internet of Things: Architectures, Applications, and Challenges

K Laturkar, K Laturkar - Handbook of Research on Data Science and …, 2023 - igi-global.com
With the internet of things (IoT) growing steadily, a wide range of application fields are being
offered. These include monitoring health, weather, smart homes, autonomous vehicles, and …

Toward the automation of threat modeling and risk assessment in IoT systems

V Casola, A De Benedictis, M Rak, U Villano - Internet of Things, 2019 - Elsevier
Abstract The Internet of Things (IoT) has recently become one of the most relevant emerging
technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of …

Scalable and configurable end-to-end collection and analysis of IoT security data: towards end-to-end security in IoT systems

A Roukounaki, S Efremidis, J Soldatos… - 2019 Global IoT …, 2019 - ieeexplore.ieee.org
In recent years, there is a surge of interest in approaches pertaining to security issues of
Internet of Things deployments and applications that leverage machine learning and deep …

A reference model for internet of things middleware

MAA da Cruz, JJPC Rodrigues… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is a term used to describe an environment where billions of objects,
constrained in terms of resources (“things”), are connected to the Internet, and interacting …

Why iot security is failing. the need of a test driven security approach

C Săndescu, O Grigorescu, R Rughiniş… - 2018 17th RoEduNet …, 2018 - ieeexplore.ieee.org
Internet of Things has evolved very quickly in recent years, being used by more and more
people in many industries such as medical, automotive, energy, etc. This ecosystem brought …

Internet of things reference architectures, security and interoperability: A survey

B Di Martino, M Rak, M Ficco, A Esposito, SA Maisto… - Internet of Things, 2018 - Elsevier
Abstract The term Internet of Things (IoT) is used as an umbrella that covers several topics,
related to the application of technological means to monitor, measure and act upon the …

Iot vulnerability scanning: a state of the art

A Amro - … , CyberICPS, SECPRE, and ADIoT, Guildford, UK …, 2020 - Springer
Our modern life becomes more and more dependent on technology and services provided
through an increasing number of deployed devices “Things” which are connected over …

Integrating IoT monitoring for security operation center

D Weissman, A Jayasumana - 2020 Global Internet of Things …, 2020 - ieeexplore.ieee.org
A Security Operation Center (SOC) performs critical functions in alerting and taking
defensive actions for computer security. As network infrastructures evolve with broader …