Security in IoMT communications: A survey
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …
order to support real-time, remote patient monitoring and treatment. However, the …
Security risk analysis of LoRaWAN and future directions
LoRa (along with its upper layers definition—LoRaWAN) is one of the most promising Low
Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT) …
Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT) …
SlowITe, a novel denial of service attack affecting MQTT
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems
The increasing integration of computational components and physical systems creates cyber-
physical system, which provide new capabilities and possibilities for humans to control and …
physical system, which provide new capabilities and possibilities for humans to control and …
Slowtt: A slow denial of service against iot networks
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
A nonlinear systems framework for cyberattack prevention for chemical process control systems
H Durand - Mathematics, 2018 - mdpi.com
Recent cyberattacks against industrial control systems highlight the criticality of preventing
future attacks from disrupting plants economically or, more critically, from impacting plant …
future attacks from disrupting plants economically or, more critically, from impacting plant …
A survey on security and privacy challenges in device discovery for next-generation systems
Device to Device (D2D) communications is a candidate technology for the fifth-generation
(5G) and beyond mobile networks and certainly that results in high throughput, less energy …
(5G) and beyond mobile networks and certainly that results in high throughput, less energy …
The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world
Operational Technology (OT) networks and devices, ie, all components used in industrial
environments, were not designed with security in mind. Efficiency and ease of use were the …
environments, were not designed with security in mind. Efficiency and ease of use were the …
Mitigating safety concerns and profit/production losses for chemical process control systems under cyberattacks via design/control methods
H Durand, M Wegener - Mathematics, 2020 - mdpi.com
One of the challenges for chemical processes today, from a safety and profit standpoint, is
the potential that cyberattacks could be performed on components of process control …
the potential that cyberattacks could be performed on components of process control …
Advanced security considerations in the arrowhead framework
Abstract The Arrowhead Framework aims to create collaborative automation using
networked embedded devices by establishing a service oriented approach to govern them …
networked embedded devices by establishing a service oriented approach to govern them …