Inferring Threatening IoT Dependencies using Semantic Digital Twins Toward Collaborative IoT Device Management
Abstract
References
Index Terms
- Inferring Threatening IoT Dependencies using Semantic Digital Twins Toward Collaborative IoT Device Management
Recommendations
SOAR4IoT: Securing IoT Assets with Digital Twins
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityAs more and more security tools provide organizations with cybersecurity capabilities, security analysts are overwhelmed by security events. Resolving these events is challenging due to extensive manual processes, limited financial resources, and human ...
Leveraging Semantic Technologies for Collaborative Inference of Threatening IoT Dependencies
IoT Device Management (DM) refers to the remote administration of customer devices. In practice, DM is ensured by multiple actors such as operators or device manufacturers, each operating independently via their DM solution. These siloed DM solutions ...
Digital Twins for IoT Security Management
Data and Applications Security and Privacy XXXVIIAbstractThe proliferation of Internet of Things (IoT) devices has increased the risk of cyber threats to the confidentiality, integrity, and availability of data processed. In this context, proactive security management has emerged as a critical strategy ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Conference Chairs:
- Jiman Hong,
- Maart Lanperne,
- Program Chairs:
- Juw Won Park,
- Tomas Cerny,
- Publication Chair:
- Hossain Shahriar
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 107Total Downloads
- Downloads (Last 12 months)52
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in