Towards a secure Internet of Things: A comprehensive study of second line defense mechanisms

M Dutta, J Granjal - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices
that have penetrated into the physical world enabling new applications like smart homes …

An autonomous intrusion detection system for the RPL protocol

M Shirafkan, A Shahidienjad… - Peer-to-Peer Networking …, 2022 - Springer
Abstract Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing
protocol for wireless networks based on distance vectors operating on the platform of IEEE …

Model Driven Implementation of Security Management Process

BA Mozzaquatro, R Jardim-Gonçalves… - … Conference on Model …, 2017 - scitepress.org
Services composition involves many time and effort to describe high-level requirements of
the business process. To this purpose, the Model Driven Service Engineering Architecture …