[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

Threat modeling intimate partner violence: Tech abuse as a cybersecurity challenge in the internet of things

J Slupska, LM Tanczer - … of technology-facilitated violence and abuse, 2021 - emerald.com
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other
emerging innovations, has a substantial impact on the nature of intimate partner violence …

A survey of cybersecurity certification for the internet of things

SN Matheu, JL Hernandez-Ramos… - ACM Computing …, 2020 - dl.acm.org
In recent years, cybersecurity certification is gaining momentum as the baseline to build a
structured approach to mitigate cybersecurity risks in the Internet of Things (IoT). This …

Cyber threat assessment and management for securing healthcare ecosystems using natural language processing

S Silvestri, S Islam, D Amelin, G Weiler… - International Journal of …, 2024 - Springer
The healthcare sectors have constantly faced significant challenge due to the rapid rise of
cyber threats. These threats can pose any potential risk within the system context and disrupt …

Challenges and opportunities for conducting dynamic risk assessments in medical IoT

RM Czekster, P Grace, C Marcon, F Hessel… - Applied Sciences, 2023 - mdpi.com
Modern medical devices connected to public and private networks require additional layers
of communication and management to effectively and securely treat remote patients …

STRIDE-based cyber security threat modeling for IoT-enabled precision agriculture systems

MR Al Asif, KF Hasan, MZ Islam… - 2021 3rd International …, 2021 - ieeexplore.ieee.org
The concept of traditional farming is changing rapidly with the introduction of smart
technologies like the Internet of Things (IoT). Under the concept of smart agriculture …

A review of asset-centric threat modelling approaches

LO Nweke, S Wolthusen - 2020 - ntnuopen.ntnu.no
The threat landscape is constantly evolving. As attackers continue to evolve and seek better
methods of compro-mising a system; in the same way, defenders continue to evolve and …

Security and provenance for Internet of Health Things: A systematic literature review

B Bai, S Nazir, Y Bai, A Anees - Journal of Software: Evolution …, 2021 - Wiley Online Library
Abstract Internet of Health Things (IoHT) is an extension of the Internet of Things (IoT), which
plays an important role in the observation, consultation, monitoring, and treatment process of …

Exploring the role of team security climate in the implementation of security by design: a case study in the defense sector

M Prud**ski, I Hadar, G Luria - IEEE Transactions on Software …, 2024 - ieeexplore.ieee.org
The rapid diffusion of software systems into all aspects of human life has exacerbated
security threats and thus amplified the requirement for proactive approaches for designing …