1 |
S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of iot: Applications, challenges, and opportunities with china perspective," IEEE Internet of Things journal, vol. 1, no. 4, pp. 349-359, 2014.
DOI
|
2 |
Lin, Shi-Wan, Brandford Miller, Jacques Durand, Graham Bleakley, Amine Chigani, Robert Martin, Brett Murphy, and Mark Crawford. 2019. The Industrial Internet of Things Volume G1: Reference Architecture V1.90. Industrial Internet Consortium, June. Accessed January 2022. https://www.iiconsortium.org/pdf/IIRA-v1.9.pdf
|
3 |
B. Ramsey, B. Mullins, Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks, in: J. Butts, S. Shenoi (Eds.), Critical Infrastructure Protection VII, Vol. 417 of IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2013, pp. 63-79
|
4 |
Gritzalis, D.; Stergiopoulos, G.; Vasilellis, E.; Anagnostopoulou, A. Readiness Exercises: Are Risk Assessment Methodologies Ready for the Cloud. In Advances in Core Computer Science-Based Technologies; Springer: Cham, Switzerland, 2021.
|
5 |
S. Shukla Reliable critical nodes detection for internet of things (iot) Wireless Networks, 27 (4) (2021), pp. 2931-2946
DOI
|
6 |
Om Kumar CU, Bhama PRKS (2019) Detecting and confronting flash attacks from IoT botnets. J Supercomput 75(12):8312-8338
DOI
|
7 |
Priyadarshini I., et al, Identifying cyber insecurities in trustworthy space and energy sector for smart grids, Comput. Electr. Eng., 93 (2021), Article 107204
|
8 |
Desnitsky, V.; Kotenko, I. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks. In Econometrics for Financial Applications; Springer Science and Business Media LLC: Berlin, Germany, 2017; Volume 737, pp. 263-270.
|
9 |
Noshina Tariq, Farrukh Aslam Khan, Muhammad Asim, Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis, Procedia Computer Science, Vol 191, 2021, pp 425-430, https://doi.org/10.1016/j.procs.2021.07.053..
DOI
|
10 |
M. Tariq, H. Majeed, M.O. Beg, F.A. Khan, A. Derhab Accurate detection of sitting posture activities in a secure iot based assisted living environment Future Generation Computer Systems, 92 (2019), pp. 745-757
DOI
|
11 |
G. M. Koien, "Reflections on trust in devices: an informal survey of human trust in an internet-of-things context," Wireless Personal Communications, vol. 61, no. 3, pp. 495-510, 2011.
DOI
|
12 |
Rachit, Bhatt, S. & Ragiri, P.R. Security trends in Internet of Things: a survey. SN Appl. Sci. 3, 121 (2021)
DOI
|
13 |
Babaei A, Schiele G (2019) Physical unclonable functions in the Internet of Things: state of the art and open challenges. Sensors 19(14):3208
DOI
|
14 |
Aldaej A (2019) Enhancing cyber security in modern Internet of things (IoT) using intrusion prevention algorithm for IoT (IPAI). IEEE Access. https://doi.org/10.1109/ACCESS.2019.2893445
DOI
|
15 |
Alshehri MD, Hussain FK (2019) A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). Computing 101(7):791-818
DOI
|
16 |
Yuchong Li, Qinghui Liu, A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments, Energy Reports, Volume 7, 2021, Pages 8176-8186
DOI
|
17 |
Keskin, O.F.; Caramancion, K.M.; Tatar, I.; Raza, O.; Tatar, U. Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports. Electronics 2021, 10, 1168. https://doi.org/10.3390/electronics10101168
DOI
|
18 |
Ogbanufe O, Enhancing end-user roles in information security: Exploring the setting, situation, and identity, Comput Secur., 108 (2021), Article 102340.
|
19 |
Niraja K.S., Srinivasa Rao S, A hybrid algorithm design for near real time detection cyber attacks from compromised devices to enhance IoT security, Mater. Today: Proc. (2021
|
20 |
J. Fuller, B. Ramsey, Rogue Z-Wave Controllers: A Persistent Attack Channel, in: 10th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), 2015, pp. 734-741
|
21 |
Boyes, Hugh, Bil Hallaq, Joe Cunningham, and Tim Watson. 2018. The Industrial Internet of Things (IIoT): An Analysis Framework. Computers in Industry 101: 1-12.
DOI
|
22 |
A. Prakash, M. Satish, T. Sri Sai Bhargav, N. Bhalaji, Detection and Mitigation of Denial of Service Attacks Using Stratified Architecture, Procedia Computer Science, Vol 87, 2016, pp. 275-280.
DOI
|
23 |
Distributed Denialof-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms in Advance Computing Conference, 2009. IACC 2009. IEEE International (2009), pp. 1275-1280
|
24 |
Jonathan D. Fuller, Benjamin W. Ramsey, Mason J. Rice, John M. Pecarina, Misuse-based detection of Z-Wave network attacks, Computers & Security, Vol 64, 2017, pp 44-58,
DOI
|
25 |
Williams CM, Chaturvedi R, Chakravarthy K Cybersecurity Risks in a Pandemic J Med Internet Res 2020 vol. 22, no. 9, e23692 doi: 10.2196/23692
DOI
|