[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …
the internet, enable remote monitoring, automation, and control. However, collecting …
[HTML][HTML] On Building Automation System security
C Morales-Gonzalez, M Harper, M Cash, L Luo… - High-Confidence …, 2024 - Elsevier
Abstract Building Automation Systems (BASs) are seeing increased usage in modern
society due to the plethora of benefits they provide such as automation for climate control …
society due to the plethora of benefits they provide such as automation for climate control …
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol
Smart home automation is part of the Internet of Things that enables house remote control
via the use of smart devices, sensors, and actuators. Despite its convenience, vulnerabilities …
via the use of smart devices, sensors, and actuators. Despite its convenience, vulnerabilities …
L2Fuzz: Discovering Bluetooth L2CAP vulnerabilities using stateful fuzz testing
Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) is a wireless technology used in
billions of devices. Recently, several Bluetooth fuzzing studies have been conducted to …
billions of devices. Recently, several Bluetooth fuzzing studies have been conducted to …
Is Z-Wave Reliable for IoT Sensors?
Home security systems have become increasingly popular since they provide an additional
layer of protection and peace of mind. These systems typically include battery-powered …
layer of protection and peace of mind. These systems typically include battery-powered …
IoT security challenges for smart homes
Nowadays, the emphasis is more and more on modernizing and ensuring the standard of
living by using intelligent IoT systems integrated with smart homes. These have some …
living by using intelligent IoT systems integrated with smart homes. These have some …
A Retrospective Analysis of a Rapid Review on Fuzz Security Testing for Software Implementation of Communication Protocols
A Marchetto - SN Computer Science, 2024 - Springer
Software implementations of communication protocols connect systems and services by
allowing them to exchange data and information. The increasing request of secure …
allowing them to exchange data and information. The increasing request of secure …
On Building Automation Systems and Attacks
C Morales-Gonzalez, M Harper, M Cash… - 2024 International …, 2024 - ieeexplore.ieee.org
Building Automation Systems (BASs) are seeing increased usage in modern society due to
the plethora of benefits they provide such as automation for climate control, HVAC systems …
the plethora of benefits they provide such as automation for climate control, HVAC systems …
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering
HTTP/2, enhancing data transmission speed over HTTP/1.1 with features such as flow
control for stream multiplexing, has seen widespread adoption across major web servers …
control for stream multiplexing, has seen widespread adoption across major web servers …
Verification and Validation Methods for a trust-by-design framework for the IoT
The development of an Internet of Things (IoT) entity is a difficult process that can be
performed following a System Development Life Cycle (SDLC). Two important phases of a …
performed following a System Development Life Cycle (SDLC). Two important phases of a …