[HTML][HTML] Resource allocation schemes for 5G network: A systematic review

MA Kamal, HW Raza, MM Alam, MM Su'ud, AAB Sajak - Sensors, 2021 - mdpi.com
Fifth-generation (5G) communication technology is intended to offer higher data rates,
outstanding user exposure, lower power consumption, and extremely short latency. Such …

IotSan: Fortifying the safety of IoT systems

DT Nguyen, C Song, Z Qian… - Proceedings of the 14th …, 2018 - dl.acm.org
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …

Conflict detection and resolution in IoT systems: a survey

P Pradeep, K Kant - IoT, 2022 - mdpi.com
Internet of Things (IoT) systems are becoming ubiquitous in various cyber–physical
infrastructures, including buildings, vehicular traffic, goods transport and delivery …

Detecting and handling {IoT} interaction threats in {Multi-Platform}{Multi-Control-Channel} smart homes

H Chi, Q Zeng, X Du - … USENIX Security Symposium (USENIX Security 23 …, 2023 - usenix.org
A smart home involves a variety of entities, such as IoT devices, automation applications,
humans, voice assistants, and companion apps. These entities interact in the same physical …

Cross-app interference threats in smart homes: Categorization, detection and handling

H Chi, Q Zeng, X Du, J Yu - 2020 50th Annual IEEE/IFIP …, 2020 - ieeexplore.ieee.org
Internet of Thing platforms prosper home automation applications (apps). Prior research
concerns intra-app security. Our work reveals that automation apps, even secured …

Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis

D Schmidt, C Tagliaro, K Borgolte… - Proceedings of the 2023 …, 2023 - dl.acm.org
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …

Scalable analysis of interaction threats in iot systems

M Alhanahnah, C Stevens, H Bagheri - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The ubiquity of Internet of Things (IoT) and our growing reliance on IoT apps are leaving us
more vulnerable to safety and security threats than ever before. Many of these threats are …

Delay wreaks havoc on your smart home: Delay-based automation interference attacks

H Chi, C Fu, Q Zeng, X Du - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices and platforms, it becomes a trend
that IoT devices associated with different IoT platforms coexist in a smart home …

Understanding and automatically detecting conflicting interactions between smart home IoT applications

R Trimananda, SAH Aqajari, J Chuang… - Proceedings of the 28th …, 2020 - dl.acm.org
Smart home devices provide the convenience of remotely control-ling and automating home
appliances. The most advanced smart home environments allow developers to write apps to …

Smart Block: A visual block language and its programming environment for IoT

N Bak, BM Chang, K Choi - Journal of Computer Languages, 2020 - Elsevier
A visual block programming language allows users to make their own programs by dragging
and drop** graphic blocks rather than by writing the program. This enables users who are …