Xu et al., 2023 - Google Patents
MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and CommandsXu et al., 2023
View PDF- Document ID
- 9504586566549890713
- Author
- Xu X
- Fu C
- Du X
- Publication year
- Publication venue
- Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
External Links
Snippet
In recent years, intelligent and automated device control features have led to a significant increase in the adoption of smart home IoT systems. Each IoT device sends its events to (and receives commands from) the corresponding IoT server/platform, which executes …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Touqeer et al. | Smart home security: challenges, issues and solutions at different IoT layers | |
Panchal et al. | Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures | |
Rondon et al. | Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective | |
KR101369727B1 (en) | Apparatus and method for controlling traffic based on captcha | |
Abed et al. | Review of security issues in Internet of Things and artificial intelligence‐driven solutions | |
US20130305357A1 (en) | Context Aware Network Security Monitoring for Threat Detection | |
Hamza et al. | IoT network security: requirements, threats, and countermeasures | |
Farooq et al. | IoT smart homes security challenges and solution | |
James | IoT cybersecurity based smart home intrusion prevention system | |
Vaccari et al. | Evaluating security of low-power internet of things networks | |
WO2017164980A1 (en) | Identifying and trapping wireless based attacks on networks using deceptive network emulation | |
Rudo et al. | Consumer UAV cybersecurity vulnerability assessment using fuzzing tests | |
Nkuba et al. | Riding the IoT wave with VFuzz: discovering security flaws in smart homes | |
Fu et al. | Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors | |
Mandalari et al. | Protected or porous: A comparative analysis of threat detection capability of IoT safeguards | |
CN115883170A (en) | Network flow data monitoring and analyzing method and device, electronic equipment and storage medium | |
Xu et al. | MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands | |
US20170085577A1 (en) | Computer method for maintaining a hack trap | |
Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
Gromov et al. | Tackling Multiple Security Threats in an IoT Environment | |
Demetriou et al. | Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness | |
Balogh et al. | LAN security analysis and design | |
Makaroff et al. | Intrusion detection systems for community wireless mesh networks | |
Rattanalerdnusorn et al. | IoTDePT: Detecting security threats and pinpointing anomalies in an IoT environment | |
Trabelsi | Investigating The Robustness Of IoT Security Cameras Against Cyber Attacks |