How machine learning changes the nature of cyberattacks on IoT networks: A survey
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …
life in recent years. However, this development does not only present advantages. Indeed …
A survey of methods supporting cyber situational awareness in the context of smart cities
A modern urban infrastructure no longer operates in isolation, but instead, leverages the
latest technologies to collect, process, and distribute aggregated knowledge in order to …
latest technologies to collect, process, and distribute aggregated knowledge in order to …
[HTML][HTML] Injection attack detection using machine learning for smart IoT applications
Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless
sensors to connect their different components (smart devices) together. Smart cities rely on …
sensors to connect their different components (smart devices) together. Smart cities rely on …
An Approach to Risk Assessment and Threat Prediction for Complex Object Security Based on a Predicative Self-Configuring Neural System
NV Korneev, JV Korneeva, SP Yurkevichyus… - Symmetry, 2022 - mdpi.com
We identified a set of methods for solving risk assessment problems by forecasting an
incident of complex object security based on incident monitoring. The solving problem …
incident of complex object security based on incident monitoring. The solving problem …
[PDF][PDF] New configurable galois/inverter ring oscillator (giro) physically unclonable functions: design, analysis and authentication algorithms
F Gebali - The Islamic University Journal of Applied Sciences …, 2022 - ece.uvic.ca
Ring oscillator physically unclonable function (RO-PUF) is a strong PUF that is simple to
operate and simple to fabricate for authentication and secure key exchange for IoT edge …
operate and simple to fabricate for authentication and secure key exchange for IoT edge …
Denial-of-sleep attacks on IoT networks
E Bout - 2022 - theses.hal.science
In recent years, Internet of Things (IoT) networks have become new favorite targets for
attackers. Their fundamental characteristic such as their energy and calculation constraints …
attackers. Their fundamental characteristic such as their energy and calculation constraints …
Illuminating Cyber Threats for Smart Cities: A Data-Driven Approach for Cyber Attack Detection with Visual Capabilities
N Neshenko - 2021 - search.proquest.com
A modern urban infrastructure no longer operates in isolation but instead leverages the
latest technologies to collect, process, and distribute aggregated knowledge to improve the …
latest technologies to collect, process, and distribute aggregated knowledge to improve the …
[PDF][PDF] Attaque par déni de sommeil sur les reseaux IoT
V Deniau - 2022 - theses.fr
Résumé Ces dernières années, les réseaux de l'Internet des Objets (IoT) sont devenus les
nouvelles cibles privilégiées des attaquants. Leur caractéristique fondamentale telle que …
nouvelles cibles privilégiées des attaquants. Leur caractéristique fondamentale telle que …
Pengenalan Pola Serangan pada Internet of Thing (IoT) Menggunakan Support Vector Mechine (SVM) dengan Tiga Kernel
Internet of things (IoT) technology is very popular these days around the world, with the
development of IoT technology raises the impact of security threats and attacks on IoT …
development of IoT technology raises the impact of security threats and attacks on IoT …
Cyber Situational Awareness Frontiers
Cyber situational awareness is a vital component of a holistic view of cybersecurity. This
chapter puts forward a new perspective on sustained cyber situational awareness for smart …
chapter puts forward a new perspective on sustained cyber situational awareness for smart …