Amokrane, 2016 - Google Patents
Internet of things: security issues, challenges and directionsAmokrane, 2016
View PDF- Document ID
- 15128886306469383725
- Author
- Amokrane A
- Publication year
- Publication venue
- Proc. C&ESAR
External Links
Snippet
The Internet of Things (IoT) is experiencing an exponential growth and it is giving rise to various applications ranging from connected homes and cars, health monitoring and smart utilities to military and critical infrastructures. This holds the potential to empower and …
- 230000012010 growth 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Makhdoom et al. | Anatomy of threats to the internet of things | |
Rani et al. | Threats and corrective measures for IoT security with observance of cybercrime: A survey | |
Kimani et al. | Cyber security challenges for IoT-based smart grid networks | |
Hou et al. | A survey on internet of things security from data perspectives | |
Deep et al. | A survey of security and privacy issues in the Internet of Things from the layered context | |
Iqbal et al. | An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security | |
Diaz Lopez et al. | Shielding IoT against cyber‐attacks: an event‐based approach using SIEM | |
Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
Samaila et al. | Security challenges of the Internet of Things | |
Hashemi et al. | Internet of Things backdoors: Resource management issues, security challenges, and detection methods | |
JP2019531567A (en) | Device authentication system and method | |
CN110692226A (en) | System and method for device authentication and verification | |
Vijayakumaran et al. | A reliable next generation cyber security architecture for industrial internet of things environment | |
Fan et al. | Understanding security in smart city domains from the ANT-centric perspective | |
Mogadem et al. | A survey on internet of energy security: related fields, challenges, threats and emerging technologies | |
Muzammal et al. | A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology | |
Kowta et al. | Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks | |
Kloibhofer et al. | LoRaWAN with HSM as a security improvement for agriculture applications | |
Li | Security Architecture in the Internet | |
Williams et al. | Security aspects of internet of things–a survey | |
Altayaran et al. | Security threats of application programming interface (API's) in internet of things (IoT) communications | |
Sookhak et al. | Security and privacy of smart cities: issues and challenge | |
Amokrane | Internet of things: security issues, challenges and directions | |
Demblewski | Security frameworks for machine-to-machine devices and networks | |
Dhondge | Lifecycle IoT Security for Engineers |