Cybersecurity Risk Analysis in the IoT: A Systematic Review

TS AlSalem, MA Almaiah, A Lutfi - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This …

Dynamic distributed honeypot based on blockchain

L Shi, Y Li, T Liu, J Liu, B Shan, H Chen - IEEE Access, 2019 - ieeexplore.ieee.org
Honeypot technology can be applied to efficiently attract attackers and exhaust their
resources. However, the traditional static honeypot is easy to be recognized by anti …

Security risk analysis in IoT systems through factor identification over IoT devices

RO Andrade, SG Yoo, I Ortiz-Garces, J Barriga - Applied Sciences, 2022 - mdpi.com
IoT systems contribute to digital transformation through the development of smart concepts.
However, the IoT has also generated new security challenges that require security tools to …

Multicriteria group decision making for prioritizing IoT risk factors with linear diophantine fuzzy sets and MARCOS method

V Jayakumar, J Kannan, N Kausar, M Deveci… - Granular …, 2024 - Springer
In a dynamic world of technological advances, the Internet of Things (IoT) is a
transformational and widespread force that has revolutionized the way we communicate with …

Security-minded verification of cooperative awareness messages

M Farrell, M Bradbury, RC Cardoso… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Autonomous robotic systems systems are both safety-and security-critical, since a breach in
system security may impact safety. In such critical systems, formal verification is used to …

Artificial intelligence-driven composition and security validation of an internet of things ecosystem

G Hatzivasilis, N Papadakis, I Hatzakis, S Ioannidis… - Applied Sciences, 2020 - mdpi.com
Key challenges in Internet-of-Things (IoT) system design and management include the
secure system composition and the calculation of the security and dependability level of the …

Towards formal verification of cyber security standards

K Tomas, LP Gorm - Труды Института системного …, 2018 - cyberleninka.ru
Cyber security standards are often used to ensure the security of industrial control systems.
Nowadays, these systems are becoming more decentralized, making them more vulnerable …

Security verification of industrial control systems using partial model checking

T Kulik, J Boudjadar, PWV Tran-Jørgensen - Proceedings of the 8th …, 2020 - dl.acm.org
Industrial control systems are moving from isolated to distributed and cloud-connected
architectures. While the operational benefits of this migration form the driving force for this …

Cilium and VDM--Towards Formal Analysis of Cilium Policies

T Kulik, J Boudjadar - arXiv preprint arXiv:2410.12009, 2024 - arxiv.org
Industrial control systems are becoming more distributed and interconnected to allow for
interaction with modern computing infrastructures. Furthermore, the amount of data …

A Comprehensive Analysis of Cybersecurity Threats based IoTs

F Shukur, ST Shukur - Journal of Applied Artificial Intelligence, 2023 - sabapub.com
The rapid growth of the Internet of Things (IoT) in our daily activities, has led to serious
concerns regarding to potential cybersecurity threats. Therefore, there is a real need to have …