Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








172 Hits in 8.6 sec

A Comprehensive Study of the IoT Cybersecurity in Smart Cities

Roberto O. Andrade, Sang Guun Yoo, Luis Tello-Oquendo, Ivan Ortiz-Garces
2020 IEEE Access  
This study explores the cybersecurity aspects that define an assessment model of cybersecurity maturity of IoT solutions to develop smart city applications.  ...  Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud Computing, and Artificial Intelligence (AI) to enhance public services management.  ...  Selected Papers to Review Journal Year Title Aspects that could generate cybersecurity issues Contribution Reference 2017 Strategic Trust in Cloud-Enabled Cyber- Physical Systems with an Application  ... 
doi:10.1109/access.2020.3046442 fatcat:o7pbraolzbcgxjj5camkkz73pe

The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective [article]

Behrouz Zolfaghari
2022 arXiv   pre-print
In recent years, the existence of a significant cross-impact between Cloud computing and Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT (CAIoT) and IoT-Based Cloud  ...  We proceed to highlight existing approaches towards the design of Secure CAIoT (SCAIoT) along with related security challenges and controls. We develop a layered architecture for SCAIoT.  ...  This technology integrates geographicallydistributed cyber-physical devices or cyber-enabled systems with the goal of providing strategic services [17] , [18] .  ... 
arXiv:2207.01590v2 fatcat:2kznp4sj7resznpiylio3wfrsa

Next Generation Internet of Things [chapter]

Ovidiu Vermesan, Joël Bacquet
2018 Next Generation Internet of Things  
Platforms should provide connectivity and intelligence, actuation and control features, linkage to modular and ad-hoc cloud services, The IoT platforms used are compatible with existing international developments  ...  The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed  ...  , security, privacy and safety constraints, resulting in convergence between IoT and Cyber Physical Systems (CPS).  ... 
doi:10.13052/rp-9788770220071 fatcat:bnyyfkhdzbghxetcwhisrqsapq

IoT European Security and Privacy Projects: Integration, Architectures and Interoperability [chapter]

Enrico Ferrera, Claudio Pastrone, Paul-Emmanuel Brun, Remi De Besombes, Konstantinos Loupos, Gerasimos Kouloumpis, Patrick O' Sullivan, Alexandros Papageorgiou, Panayiotis Katsoulakos, Bill Karakostas, Antonis Mygiakis, Christina Stratigaki (+51 others)
2022 Next Generation Internet of Things – Distributed Intelligence at the Edge and Human-Machine Interactions  
Platforms should provide connectivity and intelligence, actuation and control features, linkage to modular and ad-hoc cloud services, The IoT platforms used are compatible with existing international developments  ...  The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed  ...  , security, privacy and safety constraints, resulting in convergence between IoT and Cyber Physical Systems (CPS).  ... 
doi:10.1201/9781003338963-7 fatcat:3w7wccfwzzesrj7mwviel7zohe

Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure

Amir Djenna, Saad Harous, Djamel Eddine Saidouni
2021 Applied Sciences  
In addition, with the rapid development of adversarial techniques, current cyber threats have become more sophisticated, complicated, advanced and persistent.  ...  In this context, raising the cybersecurity posture of critical cyber infrastructures is an extremely urgent international issue.  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable.  ... 
doi:10.3390/app11104580 fatcat:6qkkahey2rd6jazfucx55zep4e

2020 Index IEEE Transactions on Industrial Informatics Vol. 16

2020 IEEE Transactions on Industrial Informatics  
Orchestrated Algorithms, Systems and Applications; TII July 2020 4788-4790 Jiang, J., see Jia, G., 1993-2002 Jiang, J., see Liu, L., 2072-2080 Jiang, J., see Zhang, X., TII Dec. 2020 7624-7636 Jiang  ...  ., Distributed Clock Synchronization Based on Intelligent Clustering in Local Area Industrial IoT Systems; TII June 2020 3697-3707 Jia, S., see Chen, C., 1873-1884 Jia, W., see Wang, T., 2054-2062 Jia  ...  ., +, TII May 2020 2917- 2928 MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things.  ... 
doi:10.1109/tii.2021.3053362 fatcat:blfvdtsc3fdstnk6qoaazskd3i

D1.1: HEIR innovations for healthcare systems

Apostolis Zarras
2021 Zenodo  
privacy in a healthcare system.  ...  This deliverable sets the scene for the project's work to follow by identifying the role of security in the health domain and gaining insight into the parameters that drive the security, assurance, and  ...  They operate in the background in a continuous manner while the user interacts with an application.  ... 
doi:10.5281/zenodo.5749855 fatcat:bazdcvuxtzdtphqp4k5yu6hap4

Cyber-Physical Systems Security: Limitations, Issues and Future Trends

Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohamad Malli
2020 Microprocessors and microsystems  
Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT).  ...  Typically, Cyber-Physical Systems (CPS) involve various interconnected systems, which can monitor and manipulate real objects and processes.  ...  Supplementary material Supplementary material associated with this article can be found, in the online version, at doi: 10.1016/j.micpro.2020.103201 .  ... 
doi:10.1016/j.micpro.2020.103201 pmid:32834204 pmcid:PMC7340599 fatcat:omeihta4vbe55cohyhbhi56mzm

New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments [chapter]

Ovidiu Vermesan, Marcello Coppola, Mario Diaz Nava, Alessandro Capra, George Kornaros, Roy Bahr, Emmanuel C. Darmois, Martin Serrano, Patrick Guillemin, Konstantinos Loupos, Lazaros Karagiannidis, Sean McGrath
2022 Internet of Things – The Call of the Edge  
The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential  ...  processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise.  ...  systems or act as processing element in connected complex cyber-physical system of systems.  ... 
doi:10.1201/9781003338611-3 fatcat:gnvvrojy2jagtl5bcf63yeoyja

Human Centric Digital Transformation and Operator 4.0 for the Oil and Gas Industry

Thumeera R. Wanasinghe, Trung Trinh, Trung Nguyen, Raymond G. Gosine, Lesley Anne James, Peter Warrian
2021 IEEE Access  
and Public Policy, and Memorial University of Newfoundland for their financial and intellectual support to this research project.  ...  ACKNOWLEDGEMENT The authors would like to thank Petroleum Research Newfoundland and Labrador (PRNL), Atlantic Canada Opportunities Agency (ACOA), Mitacs, University of Toronto's Munk School of Global Affairs  ...  INTERACTION BETWEEN OPERATOR, PHYSICAL, AND CYBER DOMAINS Although the interaction between operator, physical, and cyber domains are complex and tightly coupled with one another, at an abstract level,  ... 
doi:10.1109/access.2021.3103680 fatcat:cvrnf4tnirdznncmtgdmlmgrhu

Journal of Computer Science IJCSIS June 2021 Full Volume

IJCSIS Editor
2021 Zenodo  
The aim is to support you to achieve success in your research and scholarly experience.  ...  The International Journal of Computer Science and Information Security (IJCSIS) is one of the leading open access publisher, with hundreds of papers published each year related to different areas ranging  ...  On unknown addresses data is saved, on unspecified physical system applications run and also system administration is provided to others.  ... 
doi:10.5281/zenodo.5556913 fatcat:yineojxcujg4jnvqt6i742dhii

Workshops on Extreme Scale Design Automation (ESDA) Challenges and Opportunities for 2025 and Beyond [article]

R. Iris Bahar, Alex K. Jones, Srinivas Katkoori, Patrick H. Madden, Diana Marculescu, Igor L. Markov
2020 arXiv   pre-print
Application targets and key markets are also shifting substantially from desktop CPUs to mobile platforms to an Internet-of-Things infrastructure.  ...  In light of these changes in electronic design contexts and given EDA's significant dependence on such context, the EDA community must adapt to these changes and focus on the opportunities for research  ...  Automation for Cyber-physical Systems and Cybersecurity The need for applying design automation techniques to both cyber-physical systems and cyber-secure systems have been identified as immediate needs  ... 
arXiv:2005.01588v1 fatcat:6lpcyrobhncdvkrt6g25itw2tu

A Robust Blockchain Framework for Healthcare Information System

2020 International Journal of Engineering and Advanced Technology  
The evolving world of Data Security demands healthcare industry to have an infrastructure in place to deal with patient records.  ...  The various other applications of combining Blockchain technology with machine learning algorithms are Smart city applications, Forensic information storage systems, Energy data management systems, banking  ...  A mobile application is developed to collect health data from wearable devices and physical input are synchronize to the cloud for data sharing between health care providers and health insurance companies  ... 
doi:10.35940/ijeat.e9944.069520 fatcat:a7m7g7noorbodfe723tcqbwck4

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates

Department Of Defense Comptroller's Office
2014 Zenodo  
An emphasis in the FY 2015 budget request focuses on research to tailor treatments to patients' unique characteristics, known as "precision medicine."  ...  Included in this category is the National Center for Advancing Translational Sciences (NCATS) efforts to reengineer drug discovery and development in collaboration with industry, academia, the Food and  ...  -Implement self-healing functionality for cloud applications. -Begin evaluating technologies in Defense Information Systems Agency (DISA) testbeds to facilitate transitions into DoD clouds.  ... 
doi:10.5281/zenodo.1215345 fatcat:fjzhmynqjbaafk67q2ckcblj2m

Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications

Umar Zaman, Imran, Faisal Mehmood, Naeem Iqbal, Jungsuk Kim, Muhammad Ibrahim
2022 Electronics  
There are numerous security vulnerabilities and risks in the existing IoT-based systems due to the lack of intrinsic security technologies.  ...  In addition, our research study presents a detailed survey on enabling technologies for the futuristic, intel [...]  ...  Challenges Solutions Handling Big Data The off-chain technique is used to overcome big data issues in an IoT system by many researchers using it in an IoT system by integrating BC storage with cloud storage  ... 
doi:10.3390/electronics11121893 doaj:a3697ba81747451988750acc5a6e51d8 fatcat:7eifhinxvvalxfemonkffqlzwa
« Previous Showing results 1 — 15 out of 172 results