[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

[HTML][HTML] On Building Automation System security

C Morales-Gonzalez, M Harper, M Cash, L Luo… - High-Confidence …, 2024 - Elsevier
Abstract Building Automation Systems (BASs) are seeing increased usage in modern
society due to the plethora of benefits they provide such as automation for climate control …

ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol

CK Nkuba, S Woo, H Lee, S Dietrich - IEEE Access, 2023 - ieeexplore.ieee.org
Smart home automation is part of the Internet of Things that enables house remote control
via the use of smart devices, sensors, and actuators. Despite its convenience, vulnerabilities …

L2Fuzz: Discovering Bluetooth L2CAP vulnerabilities using stateful fuzz testing

H Park, CK Nkuba, S Woo, H Lee - 2022 52nd Annual IEEE/IFIP …, 2022 - ieeexplore.ieee.org
Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) is a wireless technology used in
billions of devices. Recently, several Bluetooth fuzzing studies have been conducted to …

Is Z-Wave Reliable for IoT Sensors?

C Vattheuer, C Liu, A Abedi, O Abari - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
Home security systems have become increasingly popular since they provide an additional
layer of protection and peace of mind. These systems typically include battery-powered …

IoT security challenges for smart homes

NG Vasilescu, P Pocatilu, M Doinea - … on Informatics in Economy (IE 2022), 2023 - Springer
Nowadays, the emphasis is more and more on modernizing and ensuring the standard of
living by using intelligent IoT systems integrated with smart homes. These have some …

A Retrospective Analysis of a Rapid Review on Fuzz Security Testing for Software Implementation of Communication Protocols

A Marchetto - SN Computer Science, 2024 - Springer
Software implementations of communication protocols connect systems and services by
allowing them to exchange data and information. The increasing request of secure …

On Building Automation Systems and Attacks

C Morales-Gonzalez, M Harper, M Cash… - 2024 International …, 2024 - ieeexplore.ieee.org
Building Automation Systems (BASs) are seeing increased usage in modern society due to
the plethora of benefits they provide such as automation for climate control, HVAC systems …

PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering

C Lee, I Jafarov, S Dietrich, H Lee - European Symposium on Research in …, 2024 - Springer
HTTP/2, enhancing data transmission speed over HTTP/1.1 with features such as flow
control for stream multiplexing, has seen widespread adoption across major web servers …

Verification and Validation Methods for a trust-by-design framework for the IoT

D Ferraris, C Fernandez-Gago, J Lopez - IFIP Annual Conference on Data …, 2022 - Springer
The development of an Internet of Things (IoT) entity is a difficult process that can be
performed following a System Development Life Cycle (SDLC). Two important phases of a …