Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions

E Altulaihan, MA Almaiah, A Aljughaiman - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) interconnects physical and virtual objects embedded with
sensors, software, and other technologies, which exchange data using the Internet. This …

A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice

J Yang, L Sun - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid development and wide application of the Internet of Things (IoT) and sensor
technologies have produced good opportunities for the development of IoT-based smart …

[HTML][HTML] Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls

S Zahid, MS Mazhar, SG Abbas, Z Hanif, S Hina… - Internet of Things, 2023 - Elsevier
Industrial automation technologies are envisioned as multi-device systems that are
constantly interacting with one another and with enterprise systems. In these industrial …

Review of botnet attack detection in SDN-enabled IoT Using machine learning

WG Negera, F Schwenker, TG Debelee, HM Melaku… - Sensors, 2022 - mdpi.com
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has
revolutionized the computing fields. These include the broad spectrum of connectivity to …

Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective

N Azam, L Michala, S Ansari… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Artificial Intelligence-based applications have been increasingly deployed in every field of
life including smart homes, smart cities, healthcare services, and autonomous systems …

Challenges and opportunities for conducting dynamic risk assessments in medical IoT

RM Czekster, P Grace, C Marcon, F Hessel… - Applied Sciences, 2023 - mdpi.com
Modern medical devices connected to public and private networks require additional layers
of communication and management to effectively and securely treat remote patients …

Multi-source knowledge reasoning for data-driven IoT security

S Zhang, G Bai, H Li, P Liu, M Zhang, S Li - Sensors, 2021 - mdpi.com
Nowadays, there are different kinds of public knowledge bases for cyber security
vulnerability and threat intelligence which can be used for IoT security threat analysis …

An automatic assessment method of cyber threat intelligence combined with ATT&CK matrix

S Zhang, P Chen, G Bai, S Wang… - Wireless …, 2022 - Wiley Online Library
With the occurrence of cyber security incidents, the value of threat intelligence is coming to
the fore. Timely extracting Indicator of Compromise (IOC) from cyber threat intelligence can …

Traditional and blockchain based IoT and IIoT security in the context of agriculture: a survey

Rishikesh, D Sinha - Wireless Personal Communications, 2023 - Springer
Agriculture is an inevitable area for research that must be prioritized as the world population
is continuously growing. To meet agricultural product demand, agricultural processes from …

Phishing attack types and mitigation: A survey

MF Alghenaim, NAA Bakar, F Abdul Rahim… - … Conference on Data …, 2022 - Springer
The proliferation of the internet and computing devices has drawn much attention during the
Covid-19 pandemic stay home and work, and this has led the organization to adapt to …