Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects

S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …

A taxonomy of network and computer attacks

S Hansman, R Hunt - Computers & Security, 2005 - Elsevier
Attacks over the years have become both increasingly numerous and sophisticated. This
paper focuses on the provisioning of a method for the analysis and categorisation of both …

Towards Robust Cyber Attack Taxonomies: A Survey with Requirements, Structures, and Assessment

PRPF Santos, PAA Resende, JJC Gondim… - ACM Computing …, 2025 - dl.acm.org
Cyber attacks have become a growing threat in today's interconnected society, and
taxonomies play a crucial role in understanding and preventing these attacks. However, the …

[BUKU][B] Software vulnerability analysis

IV Krsul - 1998 - search.proquest.com
Software vulnerability analysis Software vulnerability analysis Abstract The consequences of a
class of system failures, commonly known as software vulnerabilities, violate security policies …

Software vulnerability discovery techniques: A survey

B Liu, L Shi, Z Cai, M Li - 2012 fourth international conference …, 2012 - ieeexplore.ieee.org
Software vulnerabilities are the root cause of computer security problem. How people can
quickly discover vulnerabilities existing in a certain software has always been the focus of …

Protocol-parsing state machine and method of using same

RM Gupta, PK Jain, KE Amidon, F Gong… - US Patent …, 2007 - Google Patents
An intrusion signature describing an attack is stored on a computer. Once a plurality of
internet protocol packets is received, the plurality of internet protocol packets collec tively …

Risk and the five hard problems of cybersecurity

NM Scala, AC Reilly, PL Goethals, M Cukier - Risk Analysis, 2019 - Wiley Online Library
This perspectives article addresses risk in cyber defense and identifies opportunities to
incorporate risk analysis principles into the cybersecurity field. The Science of Security (SoS) …

Hierarchy-based method and apparatus for detecting attacks on a computer system

RM Gupta, PK Jain, KE Amidon, F Gong… - US Patent …, 2007 - Google Patents
(57) ABSTRACT A method of provisioning a computer against computer attacks includes
constructing a hierarchy characterizing dif ferent computer attacks and counter measures …

Analysis of vulnerabilities in internet firewalls

S Kamara, S Fahmy, E Schultz, F Kerschbaum… - Computers & …, 2003 - Elsevier
Firewalls protect a trusted network from an untrusted network by filtering traffic according to a
specified security policy. A diverse set of firewalls is being used today. As it is infeasible to …

It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots

D Oliveira, M Rosenthal, N Morin, KC Yeh… - Proceedings of the 30th …, 2014 - dl.acm.org
Despite the security community's emphasis on the importance of building secure software,
the number of new vulnerabilities found in our systems is increasing. In addition …