References
- T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj, "Anomaly-based intrusion detection system for IoT networks through deep learning model," Computers and Electrical Engineering, vol. 99, Apr. 2022, DOI: 10.1016/j.compeleceng.2022.107810.
- A. Corallo, M. Lazoi, M. Lezzi, and A. Luperto, "Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review," Computers in Industry, vol. 137. Elsevier B.V., May 01, 2022. DOI: 10.1016/j.compind.2022.103614.
- A. T. Chatfield and C. G. Reddick, "A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in U.S. federal government," Gov Inf Q, vol. 36, no. 2, pp. 346-357, Apr. 2019, DOI: 10.1016/j.giq.2018.09.007.
- M. Ficco and F. Palmieri, "Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios," Journal of Systems Architecture, vol. 97, pp. 107-129, Aug. 2019, DOI: 10.1016/j.sysarc.2019.04.004.
- M. Z. Gunduz and R. Das, "Cyber-security on smart grid: Threats and potential solutions," Computer Networks, vol. 169, Mar. 2020, DOI: 10.1016/j.comnet.2019.107094.
- K. Kimani, V. Oduol, and K. Langat, "Cyber security challenges for IoT-based smart grid networks," International Journal of Critical Infrastructure Protection, vol. 25, pp. 36-49, Jun. 2019, DOI: 10.1016/j.ijcip.2019.01.001.
- R. O. Andrade and S. G. Yoo, "Cognitive security: A comprehensive study of cognitive science in cybersecurity," Journal of Information Security and Applications, vol. 48, Oct. 2019, DOI: 10.1016/j.jisa.2019.06.008.
- J. Slupska and L. M. Tanczer, "Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things," in The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Emerald Group Publishing Ltd., 2021, pp. 663-688. DOI: 10.1108/978-1-83982-848-520211049.
- N. Z. Jhanjhi, M. Humayun, and S. N. Almuayqil, "Cyber security and privacy issues in industrial internet of things," Computer Systems Science and Engineering, vol. 37, no. 3, pp. 361-380, 2021, DOI: 10.32604/CSSE.2021.015206.
- C. Chong, K. Lee, and G. Ahmed, "Improving Internet Privacy, Data Protection and Security Concerns." [Online]. Available: https://journals.gaftim.com/index.php/ijtim/issue/view/1PublishedbyGAF-TIM,gaftim.com
- N. Moustafa, "New Generations of Internet of Things Datasets for Cybersecurity Applications based Machine Learning: TON_IoT Datasets."
- P. Podder, S. Bharati, M. Rubaiyat, H. Mondal, P. K. Paul, and U. Kose, "Artificial Neural Network for Cybersecurity: A Comprehensive Review."
- S. N. Matheu, J. L. Hernandez-Ramos, A. F. Skarmeta, and G. Baldini, "A Survey of Cybersecurity Certification for the Internet of Things," ACM Computing Surveys, vol. 53, no. 6. Association for Computing Machinery, Feb. 01, 2021. DOI: 10.1145/3410160.
- A. N. Lone, S. Mustajab, and M. Alam, "A comprehensive study on cybersecurity challenges and opportunities in the IoT world", Security and Privacy, vol 6, no. 6, 2023. DOI: 10.1002/spy2.318
- A. Nazir and R. A. Khan, "A novel combinatorial optimization based feature selection method for network intrusion detection," Comput Secur, vol. 102, Mar. 2021, DOI: 10.1016/j.cose.2020.102164.
- A. Sarfaraz, R. K. Chakrabortty, and D. L. Essam, "A tree structure-based improved blockchain framework for a secure online bidding system," Computer Security, vol. 102, Mar. 2021, DOI: 10.1016/j.cose.2020.102147.
- R. O. Andrade, S. G. Yoo, L. Tello-Oquendo, and I. Ortiz-Garces, "A Comprehensive Study of the IoT Cybersecurity in Smart Cities," IEEE Access, 2020, DOI: 10.1109/ACCESS.2020.3046442.
- T. Kulik, P. W. V. Tran-Jorgensen, J. Boudjadar, and C. Schultz, "A framework for threat-driven cyber security verification of IoT Systems," in Proceedings - 2018 IEEE 11th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2018, Institute of Electrical and Electronics Engineers Inc., Jul. 2018, pp. 89-97. DOI: 10.1109/ICSTW.2018.00033.
- R. Paul, Institute of Electrical and Electronics Engineers. New York Section, Institute of Electrical and Electronics Engineers. Region 1, IEEE-USA, and Institute of Electrical and Electronics Engineers, 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) : 28th- 31st October 2020, New York, USA, virtual conference.
- I. Ashraf et al., "A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry," IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2677-2690, Feb. 2023, DOI: 10.1109/TITS.2022.3164678.
- J. He, T. Li, B. Li, X. Lan, Z. Li, and Y. Wang, "An immune-based risk assessment method for digital virtual assets," Comput Secur, vol. 102, Mar. 2021, DOI: 10.1016/j.cose.2020.102134.
- S. Chakrabarti et al., 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) : 7th-9th January, 2019, University of Nevada, Las Vegas, NV, USA.
- M. Saharkhizan, A. Azmoodeh, A. Dehghantanha, K. K. R. Choo, and R. M. Parizi, "An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic," IEEE Internet Things J, vol. 7, no. 9, pp. 8852-8859, Sep. 2020, DOI: 10.1109/JIOT.2020.2996425.
- R. Da and M. Zekeriya Gunduz, "Analysis of Cyber-Attacks in IoT-based Critical Infrastructures."
- L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT privacy and security: Challenges and solutions," Applied Sciences (Switzerland), vol. 10, no. 12, Jun. 2020, DOI: 10.3390/APP10124102.
- A. Echeverria, C. Cevallos, I. Ortiz-Garces, and R. O. Andrade, "Cybersecurity model based on hardening for secure internet of things implementation," Applied Sciences (Switzerland), vol. 11, no. 7, Apr. 2021, DOI: 10.3390/app11073260.
- A. Djenna, S. Harous, and D. E. Saidouni, "Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure," Applied Sciences (Switzerland), vol. 11, no. 10, May 2021, DOI: 10.3390/app11104580.
- R. J. Raimundo and A. T. Rosario, "Cybersecurity in the Internet of Things in Industrial Management," Applied Sciences (Switzerland), vol. 12, no. 3. MDPI, Feb. 01, 2022. DOI: 10.3390/app12031598.
- M. R. Al Asif, K. F. Hasan, M. Z. Islam, and R. Khondoker, "STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems," Jan. 2022, [Online]. Available: http://arxiv.org/abs/2201.09493
- F. Mohd Ali, N.A.M Yunus, N.N. Mohamed, M. Mat Daud, E. A. Sundararajan, "A Systematic Mapping: Exploring Internet of Everything Technologies and Innovations", Symmetry 2023, vol. 15, no. 11 https://doi.org/10.3390/sym15111964