Security threats, countermeasures, and challenges of digital supply chains

B Hammi, S Zeadally, J Nebhen - ACM Computing Surveys, 2023 - dl.acm.org
The rapid growth of Information Communication Technologies (ICT) has impacted many
fields. In this context, the supply chain has also quickly evolved toward the digital supply …

[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review

F Heiding, S Katsikeas, R Lagerström - Computer Science Review, 2023 - Elsevier
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …

Survey on smart homes: Vulnerabilities, risks, and countermeasures

B Hammi, S Zeadally, R Khatoun, J Nebhen - Computers & Security, 2022 - Elsevier
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized
the way we live and interact with each other as well as with various types of systems and …

A large-scale empirical study on the vulnerability of deployed iot devices

B Zhao, S Ji, WH Lee, C Lin, H Weng… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has become ubiquitous and greatly affected peoples' daily lives.
With the increasing development of IoT devices, the corresponding security issues are …

[HTML][HTML] Teaching and learning iot cybersecurity and vulnerability assessment with shodan through practical use cases

TM Fernández-Caramés, P Fraga-Lamas - Sensors, 2020 - mdpi.com
Shodan is a search engine for exploring the Internet and thus finding connected devices. Its
main use is to provide a tool for cybersecurity researchers and developers to detect …

Generating adversarial examples against machine learning-based intrusion detector in industrial control systems

J Chen, X Gao, R Deng, Y He, C Fang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Deploying machine learning (ML)-based intrusion detection systems (IDS) is an effective
way to improve the security of industrial control systems (ICS). However, ML models …

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

S Samtani, S Yu, H Zhu, M Patton… - 2016 IEEE Conference …, 2016 - ieeexplore.ieee.org
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of
modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed …

ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you

A Daskevics, A Nikiforova - 2021 second international …, 2021 - ieeexplore.ieee.org
The paper proposes a tool for non-intrusive testing of open data sources for detecting their
vulnerabilities, called ShoBeVODSDT (Shodan-and Binary Edge-based vulnerable open …

Missed opportunities: measuring the untapped TLS support in the industrial internet of things

M Dahlmanns, J Lohmöller, J Pennekamp… - Proceedings of the …, 2022 - dl.acm.org
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …

IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you

A Daskevics, A Nikiforova - 2021 8th International Conference …, 2021 - ieeexplore.ieee.org
This study aims to analyze the state of the security of open data databases, ie being
accessible from the outside of organization, representing both relational databases and …