A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Comprehensive Study of the IoT Cybersecurity in Smart Cities
2020
IEEE Access
This study explores the cybersecurity aspects that define an assessment model of cybersecurity maturity of IoT solutions to develop smart city applications. ...
Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud Computing, and Artificial Intelligence (AI) to enhance public services management. ...
Selected Papers to Review Journal
Year
Title
Aspects that could generate cybersecurity
issues
Contribution
Reference
2017
Strategic Trust in Cloud-Enabled Cyber-
Physical Systems with an Application ...
doi:10.1109/access.2020.3046442
fatcat:o7pbraolzbcgxjj5camkkz73pe
The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective
[article]
2022
arXiv
pre-print
In recent years, the existence of a significant cross-impact between Cloud computing and Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT (CAIoT) and IoT-Based Cloud ...
We proceed to highlight existing approaches towards the design of Secure CAIoT (SCAIoT) along with related security challenges and controls. We develop a layered architecture for SCAIoT. ...
This technology integrates geographicallydistributed cyber-physical devices or cyber-enabled systems with the goal of providing strategic services [17] , [18] . ...
arXiv:2207.01590v2
fatcat:2kznp4sj7resznpiylio3wfrsa
Next Generation Internet of Things
[chapter]
2018
Next Generation Internet of Things
Platforms should provide connectivity and intelligence, actuation and control features, linkage to modular and ad-hoc cloud services, The IoT platforms used are compatible with existing international developments ...
The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed ...
, security, privacy and safety constraints, resulting in convergence between IoT and Cyber Physical Systems (CPS). ...
doi:10.13052/rp-9788770220071
fatcat:bnyyfkhdzbghxetcwhisrqsapq
IoT European Security and Privacy Projects: Integration, Architectures and Interoperability
[chapter]
2022
Next Generation Internet of Things – Distributed Intelligence at the Edge and Human-Machine Interactions
Platforms should provide connectivity and intelligence, actuation and control features, linkage to modular and ad-hoc cloud services, The IoT platforms used are compatible with existing international developments ...
The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed ...
, security, privacy and safety constraints, resulting in convergence between IoT and Cyber Physical Systems (CPS). ...
doi:10.1201/9781003338963-7
fatcat:3w7wccfwzzesrj7mwviel7zohe
Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure
2021
Applied Sciences
In addition, with the rapid development of adversarial techniques, current cyber threats have become more sophisticated, complicated, advanced and persistent. ...
In this context, raising the cybersecurity posture of critical cyber infrastructures is an extremely urgent international issue. ...
Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. ...
doi:10.3390/app11104580
fatcat:6qkkahey2rd6jazfucx55zep4e
2020 Index IEEE Transactions on Industrial Informatics Vol. 16
2020
IEEE Transactions on Industrial Informatics
Orchestrated Algorithms, Systems and Applications; TII July 2020 4788-4790 Jiang, J., see Jia, G., 1993-2002 Jiang, J., see Liu, L., 2072-2080 Jiang, J., see Zhang, X., TII Dec. 2020 7624-7636 Jiang ...
., Distributed Clock Synchronization Based on Intelligent Clustering in Local Area Industrial IoT Systems; TII June 2020 3697-3707 Jia, S., see Chen, C., 1873-1884 Jia, W., see Wang, T., 2054-2062 Jia ...
., +, TII May 2020 2917-
2928
MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled
Industrial Internet of Things. ...
doi:10.1109/tii.2021.3053362
fatcat:blfvdtsc3fdstnk6qoaazskd3i
D1.1: HEIR innovations for healthcare systems
2021
Zenodo
privacy in a healthcare system. ...
This deliverable sets the scene for the project's work to follow by identifying the role of security in the health domain and gaining insight into the parameters that drive the security, assurance, and ...
They operate in the background in a continuous manner while the user interacts with an application. ...
doi:10.5281/zenodo.5749855
fatcat:bazdcvuxtzdtphqp4k5yu6hap4
Cyber-Physical Systems Security: Limitations, Issues and Future Trends
2020
Microprocessors and microsystems
Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT). ...
Typically, Cyber-Physical Systems (CPS) involve various interconnected systems, which can monitor and manipulate real objects and processes. ...
Supplementary material Supplementary material associated with this article can be found, in the online version, at doi: 10.1016/j.micpro.2020.103201 . ...
doi:10.1016/j.micpro.2020.103201
pmid:32834204
pmcid:PMC7340599
fatcat:omeihta4vbe55cohyhbhi56mzm
New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments
[chapter]
2022
Internet of Things – The Call of the Edge
The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential ...
processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. ...
systems or act as processing element in connected complex cyber-physical system of systems. ...
doi:10.1201/9781003338611-3
fatcat:gnvvrojy2jagtl5bcf63yeoyja
Human Centric Digital Transformation and Operator 4.0 for the Oil and Gas Industry
2021
IEEE Access
and Public Policy, and Memorial University of Newfoundland for their financial and intellectual support to this research project. ...
ACKNOWLEDGEMENT The authors would like to thank Petroleum Research Newfoundland and Labrador (PRNL), Atlantic Canada Opportunities Agency (ACOA), Mitacs, University of Toronto's Munk School of Global Affairs ...
INTERACTION BETWEEN OPERATOR, PHYSICAL, AND CYBER DOMAINS Although the interaction between operator, physical, and cyber domains are complex and tightly coupled with one another, at an abstract level, ...
doi:10.1109/access.2021.3103680
fatcat:cvrnf4tnirdznncmtgdmlmgrhu
Journal of Computer Science IJCSIS June 2021 Full Volume
2021
Zenodo
The aim is to support you to achieve success in your research and scholarly experience. ...
The International Journal of Computer Science and Information Security (IJCSIS) is one of the leading open access publisher, with hundreds of papers published each year related to different areas ranging ...
On unknown addresses data is saved, on unspecified physical system applications run and also system administration is provided to others. ...
doi:10.5281/zenodo.5556913
fatcat:yineojxcujg4jnvqt6i742dhii
Workshops on Extreme Scale Design Automation (ESDA) Challenges and Opportunities for 2025 and Beyond
[article]
2020
arXiv
pre-print
Application targets and key markets are also shifting substantially from desktop CPUs to mobile platforms to an Internet-of-Things infrastructure. ...
In light of these changes in electronic design contexts and given EDA's significant dependence on such context, the EDA community must adapt to these changes and focus on the opportunities for research ...
Automation for Cyber-physical Systems and Cybersecurity The need for applying design automation techniques to both cyber-physical systems and cyber-secure systems have been identified as immediate needs ...
arXiv:2005.01588v1
fatcat:6lpcyrobhncdvkrt6g25itw2tu
A Robust Blockchain Framework for Healthcare Information System
2020
International Journal of Engineering and Advanced Technology
The evolving world of Data Security demands healthcare industry to have an infrastructure in place to deal with patient records. ...
The various other applications of combining Blockchain technology with machine learning algorithms are Smart city applications, Forensic information storage systems, Energy data management systems, banking ...
A mobile application is developed to collect health data from wearable devices and physical input are synchronize to the cloud for data sharing between health care providers and health insurance companies ...
doi:10.35940/ijeat.e9944.069520
fatcat:a7m7g7noorbodfe723tcqbwck4
Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates
2014
Zenodo
An emphasis in the FY 2015 budget request focuses on research to tailor treatments to patients' unique characteristics, known as "precision medicine." ...
Included in this category is the National Center for Advancing Translational Sciences (NCATS) efforts to reengineer drug discovery and development in collaboration with industry, academia, the Food and ...
-Implement self-healing functionality for cloud applications. -Begin evaluating technologies in Defense Information Systems Agency (DISA) testbeds to facilitate transitions into DoD clouds. ...
doi:10.5281/zenodo.1215345
fatcat:fjzhmynqjbaafk67q2ckcblj2m
Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications
2022
Electronics
There are numerous security vulnerabilities and risks in the existing IoT-based systems due to the lack of intrinsic security technologies. ...
In addition, our research study presents a detailed survey on enabling technologies for the futuristic, intel [...] ...
Challenges Solutions Handling Big Data The off-chain technique is used to overcome big data issues in an IoT system by many researchers using it in an IoT system by integrating BC storage with cloud storage ...
doi:10.3390/electronics11121893
doaj:a3697ba81747451988750acc5a6e51d8
fatcat:7eifhinxvvalxfemonkffqlzwa
« Previous
Showing results 1 — 15 out of 172 results