Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets
Machine learning and artificial intelligence are increasingly being utilized to automate identifying and defining security requirements (SR) and addressing diverse IoT security issues. Despite its extensive environment, IoT-focused cyberattacks had the largest attack surface. IoT security requiremen...
Published in: | International Journal on Informatics Visualization |
---|---|
Main Author: | Janisar A.A.; Bin Kalid K.S.; Sarlan A.B.; Iqbal M.A.; Khan M.A. |
Format: | Review |
Language: | English |
Published: |
Politeknik Negeri Padang
2024
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85211333563&doi=10.62527%2fjoiv.8.3-2.3084&partnerID=40&md5=bc9b8da74db9a65f79f8417b24e405ab |
Similar Items
-
Security Attack on IoT Related Devices Using Raspberry Pi and Kali Linux
by: Mohd Bakry B.B.; Bt Adenan A.R.; Mohd Yussoff Y.B.
Published: (2022) -
Mitigating DBA Exploits: Enhanced Security Against Degradation Attacks in XG-PON
by: Atan F.M.; Zulkifli N.; Idrus S.M.; Zin N.A.M.; Ismail N.A.
Published: (2024) -
A security analysis of Iot encryption: Sidechannel cube attack on Simeck32/64
by: Buja A.G.; Abdul-Latip S.F.; Ahmad R.
Published: (2018) -
IoT based on secure personal healthcare using RFID technology and steganography
by: Khan H.A.; Abdulla R.; Selvaperumal S.K.; Bathich A.
Published: (2021) -
Mitigating Ransomware Risks in Manufacturing and the Supply Chain: A Comprehensive Security Framework
by: Aljoghaiman A.; Sundram V.P.K.
Published: (2023)