Management platform of threats information in IoT environment

E Ko, T Kim, H Kim - Journal of Ambient Intelligence and Humanized …, 2018 - Springer
Recently, the use of IoT devices in living environments has increased due to the
development of various wireless communication technologies. As the number of types of IoT …

A design of automated vulnerability information management system for secure use of internet-connected devices based on internet-wide scanning methods

T Kim, H Kim - IEICE TRANSACTIONS on Information and Systems, 2021 - search.ieice.org
Any Internet-connected device is vulnerable to being hacked and misused. Hackers can find
vulnerable IoT devices, infect malicious codes, build massive IoT botnets, and remotely …

[PDF][PDF] Scout: A Contactless 'Active'Reconnaissance Known Vulnerability Assessment Tool

J O'Hare - 2018 - researchgate.net
Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect
active reconnaissance results, and provide access to this information publically through …

Пассивный анализ защищенности информационных систем

АВ Щербаков - Безопасные информационные технологии, 2017 - elibrary.ru
В настоящее время повышение количества устройств и сервисов, которые напрямую
доступны из интернета, создают новые проблемы информационной безопасности …

[CITATION][C] 非入侵式网络安全扫描技术研究

王宸东, 郭渊博, 黄伟 - 信息安全与通信保密, 2016