A survey of cybersecurity certification for the internet of things

SN Matheu, JL Hernandez-Ramos… - ACM Computing …, 2020 - dl.acm.org
In recent years, cybersecurity certification is gaining momentum as the baseline to build a
structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This …

[HTML][HTML] Information security risk assessment

I Kuzminykh, B Ghita, V Sokolov, T Bakhshi - Encyclopedia, 2021 - mdpi.com
Definition Information security risk assessment is an important part of enterprises'
management practices that helps to identify, quantify, and prioritize risks against criteria for …

Defining security requirements with the common criteria: Applications, adoptions, and challenges

N Sun, CT Li, H Chan, BD Le, MZ Islam… - IEEE …, 2022 - ieeexplore.ieee.org
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …

How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond

N Sun, CT Li, H Chan, MZ Islam, MR Islam… - Ieee …, 2022 - ieeexplore.ieee.org
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and
other unexpected events, is essential for organizations facing inundating security threats on …

[PDF][PDF] Increasing Teacher Competence in Cybersecurity Using the EU Security Frameworks.

I Kuzminykh, M Yevdokymenko… - … Journal of Modern …, 2021 - researchgate.net
A study was undertaken to identify the missing skill and expertise of teachers and other
stakeholders in the field of EU cyber security regulatory documents and frameworks. In order …

The challenges with Internet of Things security for business

I Kuzminykh, B Ghita, JM Such - International Conference on Next …, 2021 - Springer
Many companies consider IoT as a core element for increasing competitiveness. Despite the
growing number of cyberattacks on IoT devices and the importance of IoT security, no study …

Comparative analysis of cryptographic key management systems

I Kuzminykh, B Ghita, S Shiaeles - International Conference on Next …, 2020 - Springer
Managing cryptographic keys can be a complex task for an enterprise and particularly
difficult to scale when an increasing number of users and applications need to be managed …

A strategic approach to model the machine-to-machine communication of industrial IoT system for MQTT protocol with a case study

S Pawar, S Patil - Proceedings of 3rd International Conference on …, 2022 - Springer
Abstract The Industrial IoT systems are now becoming more complex and ubiquitous as they
are integrating large number of physical devices, and virtual services are expanding over …

Encryption Algorithms in IoT: Security vs Lifetime

I Kuzminykh, M Yevdokymenko… - Available at SSRN …, 2021 - papers.ssrn.com
IoT devices are inherently limited by their processing capabilities and power capacity. While
aiming to maximize their lifespan, one of the biggest challenges they face is to reduce the …

[PDF][PDF] A novel image encryption approach for IoT applications

WA Alawsi, HK Obayes, SM Hussain - Webology, 2022 - researchgate.net
The rapid developments observed in the field of Internet of Things (IoT), along with the
recently increasing dependence on this technology in home and financial applications, have …