N Saxena, E Hayes, E Bertino, P Ojo, KKR Choo… - Electronics, 2020 - mdpi.com
The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape …
Blockchain and distributed ledger technologies have received significant interest in various areas beyond the financial sector, with profound applications in the Internet of Things (IoT) …
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following …
In the last few years, a countless number of permissioned blockchain solutions have been proposed, with each one to claim that it revolutionizes the way of the transaction processing …
In a world where organisations are embracing new IT working models such as Bring Your Own Device (BYOD) and remote working, the traditional mindset of defending the network …
In the last years, the number of connections in mobile telecommunication networks has increased rampantly, and in consequence, the number and type of relationships among …
The advent of the Industrial Internet of Things (IIoT) integrates all manners of computing technologies, from tiny actuators to process-intensive servers. The distributed network of IoT …
W Li, Y Wang, J Li - Journal of Systems Architecture, 2022 - Elsevier
Abstract Internet of Things (IoT) has become more important for setting up a smart environment, eg, smart home. It is a network of connected devices, which can provide many …
With the continuously increasing number of security incidents targeting sensors, embedded devices, and other electronics appliances and systems that comprise the so-called Internet …