Cargando…
Automatic Verification and Execution of Cyber Attack on IoT Devices
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to critical infrastructure, they are used everywhere. This makes them ideal targets for malicious actors to exploit for nefarious purposes. Recent attacks like the Mirai botnet are just examples in which def...
Autores principales: | Færøy, Fartein Lemjan, Yamin, Muhammad Mudassar, Shukla, Ankur, Katt, Basel |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9864476/ https://www.ncbi.nlm.nih.gov/pubmed/36679532 http://dx.doi.org/10.3390/s23020733 |
Ejemplares similares
-
Hybrid IoT Cyber Range
por: Balto, Karl Edvard, et al.
Publicado: (2023) -
Addressing the Security Gap in IoT: Towards an IoT Cyber Range
por: Nock, Oliver, et al.
Publicado: (2020) -
Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review
por: Singh, Rinki, et al.
Publicado: (2023) -
UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices
por: Seljeseth, Mats, et al.
Publicado: (2020) -
Cyber physical computing for IoT-driven services
por: Hahanov, Vladimir
Publicado: (2018)