Abstract
A more connected world sounds alluring, but without better protections, the Internet of Things could lead to disaster.
- Schneier, B. Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. W. W. Norton & Company (September 4, 2018). Google ScholarDigital Library
- Conti, M., Dehghantanha, A., Franke, K., and Watson, S. Internet of Things Security and Forensics: Challenges and Opportunities. Future Generation Computer Systems, Volume 78, Part 2, January 2018, pp. 544-546. https://www.sciencedirect.com/science/article/pii/S0167739X17316667.Google Scholar
- Alaba, F.A., Othman, M., Hashem, A.T., and Alotabi, F. Internet of Things Security: A Survey. Journal of Network and Computer Applications, Volume 88, 15 June 2017, pp. 10-28. https://www.sciencedirect.com/science/article/pii/S1084804517301455. Google ScholarDigital Library
- Mosenia, A. and Jha, N.K. A Comprehensive Study of Security of Internet-of-Things. IEEE Transactions on Emerging Topics in Computing, Volume: 5, Issue: 4, Oct.-Dec. 1 2017, pp. 586-602. https://ieeexplore.ieee.org/abstract/document/7562568.Google ScholarCross Ref
Index Terms
- Deep insecurities: the internet of things shifts technology risk
Recommendations
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey
Internet of Things (IoT) applications have been used in a wide variety of domains ranging from smart home, healthcare, smart energy, and Industrial 4.0. While IoT brings a number of benefits including convenience and efficiency, it also introduces a ...
Deep learning and big data technologies for IoT security
AbstractTechnology has become inevitable in human life, especially the growth of Internet of Things (IoT), which enables communication and interaction with various devices. However, IoT has been proven to be vulnerable to security breaches. ...
Comments