[HTML][HTML] A perfect storm: Digital twins, cybersecurity, and general contracting firms

E Pärn, N Ghadiminia, BG de Soto… - Developments in the Built …, 2024 - Elsevier
Amidst the architectural, engineering and construction (AEC) sector's transformation through
policy-supported digitalization and digital twin (DT) advocacy, it remains unclear how …

Mqtt security: A novel fuzzing approach

S Hernández Ramos, MT Villalba… - … and Mobile Computing, 2018 - Wiley Online Library
The Internet of Things is a concept that is increasingly present in our lives. The emergence
of intelligent devices has led to a paradigm shift in the way technology interacts with the …

Lightweight authentication for MQTT to improve the security of IoT communication

RS Bali, F Jaafar, P Zavarasky - … of the 3rd International Conference on …, 2019 - dl.acm.org
A widely used application layer protocol for IoT communication is Message Queue
Telemetry Transport (MQTT) protocol. The provision of security in MQTT protocol is an …

A novel simplified aes algorithm for lightweight real-time applications: Testing and discussion

M Qasaimeh, RS Al-Qassas… - Recent Advances in …, 2020 - benthamdirect.com
Background: Lightweight cryptographic algorithms have been the focus of many researchers
in the past few years. This has been inspired by the potential developments of lightweight …

Towards a secure industrial Internet of Things

G Spathoulas, S Katsikas - Security and privacy trends in the industrial …, 2019 - Springer
Abstract The Industrial Internet of Things (IIoT), being one of the underlying and enabling
technologies of the Industry 4.0 initiative, brings about expectations for unprecedented value …

Application study of hardware-based security for future industrial IoT

R Matischek, B Bara - 2019 22nd Euromicro Conference on …, 2019 - ieeexplore.ieee.org
The stepwise evolution of conventional production facilities into future Smart Factory or
Industrial IoT paradigms entails special requirements on future industrial devices and …

Automated security test generation for MQTT using attack patterns

H Sochor, F Ferrarotti, R Ramler - Proceedings of the 15th International …, 2020 - dl.acm.org
The dramatic increase of attacks and malicious activities has made security a major concern
in the development of interconnected cyber-physical systems and raised the need to …

Portable trust anchor for OPC UA using auto-configuration

D Meier, F Patzer, M Drexler… - 2020 25th IEEE …, 2020 - ieeexplore.ieee.org
With increasing connectivity between industrial devices their attack surface grows.
Consequently, secure setups have to allow these devices to distinguish trustworthy and …

An architecture for automated security test case generation for MQTT systems

H Sochor, F Ferrarotti, R Ramler - International Conference on Database …, 2020 - Springer
Abstract Message Queuing Telemetry Transport (MQTT) protocol is among the preferred
publish/subscribe protocols used for Machine-to-Machine (M2M) communication and …

MHealth application for cancer care delivery

K Üğüdücü, T Cerit, AG Toprak… - AIP Conference …, 2024 - pubs.aip.org
Mobile health (mHealth) is the name given to using mobile technology, including wearables
and health tracking applications, to monitor and share health information. The use of mobile …