Amokrane, 2016 - Google Patents
Internet of things: security issues, challenges and directionsAmokrane, 2016
View PDF- Document ID
- 15128886306469383725
- Author
- Amokrane A
- Publication year
- Publication venue
- Proc. C&ESAR
External Links
Snippet
The Internet of Things (IoT) is experiencing an exponential growth and it is giving rise to various applications ranging from connected homes and cars, health monitoring and smart utilities to military and critical infrastructures. This holds the potential to empower and …
- 230000012010 growth 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rani et al. | Threats and corrective measures for IoT security with observance of cybercrime: A survey | |
Makhdoom et al. | Anatomy of threats to the internet of things | |
Deep et al. | A survey of security and privacy issues in the Internet of Things from the layered context | |
Kimani et al. | Cyber security challenges for IoT-based smart grid networks | |
Hou et al. | A survey on internet of things security from data perspectives | |
Iqbal et al. | An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security | |
Diaz Lopez et al. | Shielding IoT against cyber‐attacks: an event‐based approach using SIEM | |
Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
Hashemi et al. | Internet of Things backdoors: Resource management issues, security challenges, and detection methods | |
Samaila et al. | Security challenges of the Internet of Things | |
JP2019531567A (en) | Device authentication system and method | |
CN110692226A (en) | System and method for device authentication and verification | |
Vijayakumaran et al. | A reliable next generation cyber security architecture for industrial internet of things environment | |
Fan et al. | Understanding security in smart city domains from the ANT-centric perspective | |
Mogadem et al. | A survey on internet of energy security: related fields, challenges, threats and emerging technologies | |
Muzammal et al. | A study on secured authentication and authorization in Internet of Things: Potential of blockchain technology | |
Williams et al. | Security aspects of internet of things–a survey | |
Valadares et al. | Security challenges and recommendations in 5G-IoT scenarios | |
Kloibhofer et al. | LoRaWAN with HSM as a security improvement for agriculture applications | |
Kowta et al. | Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks | |
Li | Security Architecture in the Internet | |
Sookhak et al. | Security and privacy of smart cities: issues and challenge | |
Altayaran et al. | Security threats of application programming interface (API's) in internet of things (IoT) communications | |
Amokrane | Internet of things: security issues, challenges and directions | |
Dhondge | Lifecycle IoT Security for Engineers |