Threat analysis of software systems: A systematic literature review
Architectural threat analysis has become an important cornerstone for organizations
concerned with develo** secure software. Due to the large number of existing techniques …
concerned with develo** secure software. Due to the large number of existing techniques …
Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology
R Kumar, R Tripathi - the Journal of Supercomputing, 2021 - Springer
Abstract The Internet of Medical Things (IoMT) is the next frontier in the digital revolution and
it leverages IoT in the healthcare domain. The underlying technology has changed the …
it leverages IoT in the healthcare domain. The underlying technology has changed the …
Artificial intelligence techniques for cognitive sensing in future IoT: State-of-the-Art, potentials, and challenges
Smart, secure and energy-efficient data collection (DC) processes are key to the realization
of the full potentials of future Internet of Things (FIoT)-based systems. Currently, challenges …
of the full potentials of future Internet of Things (FIoT)-based systems. Currently, challenges …
IoMT-SAF: Internet of medical things security assessment framework
The emergence of the Internet of Medical Things (IoMT) has introduced a monumental
change in facilitating the management of diseases, improving diseases diagnosis and …
change in facilitating the management of diseases, improving diseases diagnosis and …
IotSan: Fortifying the safety of IoT systems
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …
A roadmap toward the resilient internet of things for cyber-physical systems
The Internet of Things (IoT) is a ubiquitous system connecting many different devices-the
things-which can be accessed from the distance. The cyber-physical systems (CPSs) …
things-which can be accessed from the distance. The cyber-physical systems (CPSs) …
BBNSF: Blockchain-Based Novel Secure Framework Using RP2-RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems
The wearable healthcare equipment is primarily designed to alert patients of any specific
health conditions or to act as a useful tool for treatment or follow-up. With the growth of …
health conditions or to act as a useful tool for treatment or follow-up. With the growth of …
A survey of practical formal methods for security
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …
introduces new risks for cyber attacks, which can compromise the security and disrupt the …
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study
Abstract IoT (Internet of Things) devices are extensively used in security-critical services, as
for example home door opening, gas monitoring, alarm systems, etc. Often, they use …
for example home door opening, gas monitoring, alarm systems, etc. Often, they use …
A state-of-the-art survey on formal verification of the internet of things applications
In recent years, Internet of Things (IoT) has been one of the most popular technologies that
facilitate new interactions among things and humans to enhance the quality of life. With the …
facilitate new interactions among things and humans to enhance the quality of life. With the …