Internet of Things (IoT) cybersecurity research: A review of current research topics

Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …

Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

Security and privacy approaches in mixed reality: A literature survey

JA De Guzman, K Thilakarathna… - ACM Computing Surveys …, 2019 - dl.acm.org
Mixed reality (MR) technology development is now gaining momentum due to advances in
computer vision, sensor fusion, and realistic display technologies. With most of the research …

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …

Technology acceptance drivers for AR smart glasses in the middle east: A quantitative study

A Alsharhan, S Salloum… - International Journal of …, 2022 - m.growingscience.com
This study aims to establish Middle East users' perspectives on the major factors that impact
their decision to adopt Augmented Reality AR smart glasses (ARSG). Thus, an online …

Privacy by designers: software developers' privacy mindset

I Hadar, T Hasson, O Ayalon, E Toch… - Empirical Software …, 2018 - Springer
Privacy by design (PbD) is a policy measure that guides software developers to apply
inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is …

IoT-aided robotics applications: Technological implications, target domains and open issues

LA Grieco, A Rizzo, S Colucci, S Sicari, G Piro… - Computer …, 2014 - Elsevier
The ongoing revolution of Internet of Things (IoT), together with the growing diffusion of
robots in many activities of every day life, makes IoT-aided robotics applications a tangible …

Autonomic schemes for threat mitigation in Internet of Things

QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …

Protection goals for privacy engineering

M Hansen, M Jensen, M Rost - 2015 IEEE security and privacy …, 2015 - ieeexplore.ieee.org
Six protection goals provide a common scheme for addressing the legal, technical,
economic, and societal dimensions of privacy and data protection in complex IT systems. In …

Privacy-preserving schemes for ad hoc social networks: A survey

MA Ferrag, L Maglaras, A Ahmim - … Communications Surveys & …, 2017 - ieeexplore.ieee.org
We review the state of the art of privacypreserving schemes for ad hoc social networks
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …