Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective
暂无分享,去创建一个
Kemal Akkaya | Leonardo Babun | A. Selcuk Uluagac | Ahmet Aris | Luis Puche Rondon | Leonardo Babun | A. Uluagac | K. Akkaya | Ahmet Aris | Kemal Akkaya
[1] Guoai Xu,et al. Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks , 2020, IEEE Transactions on Dependable and Secure Computing.
[2] Athanasios V. Vasilakos,et al. Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System , 2021, IEEE Internet of Things Journal.
[3] Athanasios V. Vasilakos,et al. Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System , 2021, IEEE Internet of Things Journal.
[4] Dan Zhang,et al. A survey on attack detection, estimation and control of industrial cyber-physical systems. , 2021, ISA transactions.
[5] Athanasios V. Vasilakos,et al. Security and Privacy for Mobile Edge Caching: Challenges and Solutions , 2020, IEEE Wireless Communications.
[6] Leonardo Babun,et al. HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks , 2020, IEEE Transactions on Network Science and Engineering.
[7] Amit Kumar Sikder,et al. A Survey on Security and Privacy Issues in Modern Healthcare Systems , 2020, ACM Trans. Comput. Heal..
[8] Leonardo Babun,et al. Real-time Analysis of Privacy-(un)aware IoT Applications , 2019, Proc. Priv. Enhancing Technol..
[9] Fallout of SolarWinds hack could last for years , 2020, Emerald Expert Briefings.
[10] Kary Främling,et al. Security in product lifecycle of IoT devices: A survey , 2020, J. Netw. Comput. Appl..
[11] Ashok Kumar Das,et al. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment , 2020, IEEE Transactions on Industrial Informatics.
[12] Kemal Akkaya,et al. PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings , 2020, BuildSys@SenSys.
[13] Amit Kumar Sikder,et al. Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.
[14] Athanasios V. Vasilakos,et al. Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems , 2020, Future Gener. Comput. Syst..
[15] Nawaf Rasheed Alharbe,et al. ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY , 2020 .
[16] Amit Kumar Sikder,et al. HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[17] Elizabeth S. Bentley,et al. Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[18] Leonardo Babun,et al. USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework , 2020, Journal of Hardware and Systems Security.
[19] Yan Huang,et al. Risk Assessment of Private Information Inference for Motion Sensor Embedded IoT Devices , 2020, IEEE Transactions on Emerging Topics in Computational Intelligence.
[20] Mohammad Zulkernine,et al. Attacks and Defenses in Short-Range Wireless Technologies for IoT , 2020, IEEE Access.
[21] Mathy Vanhoef,et al. Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[22] Athanasios V. Vasilakos,et al. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment , 2020, J. Netw. Comput. Appl..
[23] Yingjiu Li,et al. Lightweight Sharable and Traceable Secure Mobile Health System , 2020, IEEE Transactions on Dependable and Secure Computing.
[24] Engin Kirda,et al. Kratos: multi-user multi-device-aware access control system for the smart home , 2019, WISEC.
[25] Leonardo Babun,et al. A System-level Behavioral Detection Framework for Compromised CPS Devices , 2019, ACM Trans. Cyber Phys. Syst..
[26] Georg Sigl,et al. Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks , 2019, 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[27] Amit Kumar Sikder,et al. A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices , 2019, IEEE Transactions on Mobile Computing.
[28] Mauro Conti,et al. Peek-a-boo: i see your smart home activities, even encrypted! , 2018, WISEC.
[29] Leonardo Babun,et al. MAD-IoT: Memory Anomaly Detection for the Internet of Things , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).
[30] Mohammad Zulkernine,et al. WPA3 Connection Deprivation Attacks , 2019, CRiSIS.
[31] Leonardo Babun,et al. USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework , 2019, SecureComm.
[32] Amit Kumar Sikder,et al. Aegis: a context-aware security framework for smart home systems , 2019, ACSAC.
[33] Kemal Akkaya,et al. HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol , 2019, ACSAC.
[34] Mohammad Zulkernine,et al. Bluetooth Low Energy Makes “Just Works” Not Work , 2019, 2019 3rd Cyber Security in Networking Conference (CSNet).
[35] Amit Kumar Sikder,et al. HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems , 2019, 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS).
[36] Mohammad Zulkernine,et al. Bad-token: denial of service attacks on WPA3 , 2019, SIN.
[37] Rakesh Kumar,et al. On cloud security requirements, threats, vulnerabilities and countermeasures: A survey , 2019, Comput. Sci. Rev..
[38] Quanyan Zhu,et al. IoT Supply Chain Security: Overview, Challenges, and the Road Ahead , 2019, ArXiv.
[39] Biplab Sikdar,et al. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.
[40] Leonardo Babun,et al. Verifying Internet of Things Safety and Security in Physical Spaces , 2019, IEEE Security & Privacy.
[41] Dirk Timmermann,et al. Performance Analysis of a Secured BACnet/IP Network , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).
[42] Leonardo Babun,et al. Dynamically detecting USB attacks in hardware: poster , 2019, WiSec.
[43] Duncan Hodges,et al. Reconstructing What You Said: Text Inference Using Smartphone Motion , 2019, IEEE Transactions on Mobile Computing.
[44] Antonio Bucchiarone,et al. Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era , 2019, Future Internet.
[45] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[46] Pavol Tanuska,et al. Serial Communication Protocol With Enhanced Properties–Securing Communication Layer for Smart Sensors Applications , 2019, IEEE Sensors Journal.
[47] Murtuza Jadliwala,et al. Light Ears , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[48] Victor I. Chang,et al. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..
[49] Mordechai Guri,et al. aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR) , 2017, Comput. Secur..
[50] Jason S. Seibel,et al. MOTION-BASED SIDE-CHANNEL ATTACK ON MOBILE KEYSTROKES , 2019 .
[51] Anna Volkova,et al. Security Challenges in Control Network Protocols: A Survey , 2019, IEEE Communications Surveys & Tutorials.
[52] Mohammad Zulkernine,et al. Connection Dumping Vulnerability Affecting Bluetooth Availability , 2018, CRiSIS.
[53] Thaier Hayajneh,et al. A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3 , 2018, Electronics.
[54] Amit Kumar Sikder,et al. IoTDots: A Digital Forensics Framework for Smart Environments , 2018, ArXiv.
[55] Firdous Kausar,et al. Security Attacks and Countermeasures on Cloud Assisted IoT Applications , 2018, 2018 IEEE International Conference on Smart Cloud (SmartCloud).
[56] S. Mohammad Razavizadeh,et al. Phase Jamming Attack: A Practical Attack on Physical layer-Based Key Derivation , 2018, 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC).
[57] Athanasios V. Vasilakos,et al. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..
[58] Yi Liang,et al. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.
[59] Athanasios V. Vasilakos,et al. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment , 2018, IEEE Journal of Biomedical and Health Informatics.
[60] Mohamed Hamdi,et al. Secured Distributed IoT Based Supply Chain Architecture , 2018, 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).
[61] Attahiru Sule Alfa,et al. A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks , 2018, Sensors.
[62] Mark Mohammad Tehranipoor,et al. ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain , 2018, ACM Trans. Design Autom. Electr. Syst..
[63] Leonardo Babun,et al. Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques , 2018, 2018 IEEE International Conference on Communications (ICC).
[64] Mordechai Guri,et al. Bridgeware , 2018, Commun. ACM.
[65] Kemal Akkaya,et al. WACA: Wearable-Assisted Continuous Authentication , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[66] Patrick D. McDaniel,et al. Sensitive Information Tracking in Commodity IoT , 2018, USENIX Security Symposium.
[67] Trent Jaeger,et al. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications , 2018, ArXiv.
[68] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[69] Mauro Conti,et al. Advertising in the IoT Era: Vision and Challenges , 2018, IEEE Communications Magazine.
[70] Wenyuan Xu,et al. Risks of trusting the physics of sensors , 2018, Commun. ACM.
[71] Weiming Zhang,et al. IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals , 2018, ArXiv.
[72] Mauro Conti,et al. A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..
[73] James She,et al. BLE Beacons for Internet of Things Applications: Survey, Challenges, and Opportunities , 2018, IEEE Internet of Things Journal.
[74] Yi Mu,et al. Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure , 2018, Personal and Ubiquitous Computing.
[75] Abdul Hanan Abdullah,et al. Side channel attacks on smart home systems: A short overview , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.
[76] Raimir Holanda Filho,et al. A Quantitative Model for Dynamic Security Analysis of Wireless Sensor Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[77] Othman O. Khalifa,et al. Automated daily human activity recognition for video surveillance using neural network , 2017, 2017 IEEE 4th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA).
[78] Radek Krejčí,et al. Security survey of the IoT wireless protocols , 2017, 2017 25th Telecommunication Forum (TELFOR).
[79] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.
[80] Leonardo Babun,et al. A Survey on Function and System Call Hooking Approaches , 2017, Journal of Hardware and Systems Security.
[81] Insoo Koo,et al. Energy exhaustion attacks in wireless networks , 2017, 2017 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON).
[82] Wenyuan Xu,et al. DolphinAttack: Inaudible Voice Commands , 2017, CCS.
[83] Athanasios V. Vasilakos,et al. Software-Defined Networking for Internet of Things: A Survey , 2017, IEEE Internet of Things Journal.
[84] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[85] Bharat Bhushan,et al. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[86] Torben Weis,et al. Identifying TV Channels & On-Demand Videos using Ambient Light Sensors , 2017, Pervasive and Mobile Computing.
[87] Carles Gomez,et al. Bluetooth Low Energy Mesh Networks: A Survey , 2017, Sensors.
[88] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[89] Amit Kumar Sikder,et al. 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices , 2017, USENIX Security Symposium.
[90] Kun Yang,et al. CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain , 2017, ACM Trans. Design Autom. Electr. Syst..
[91] Suat Özdemir,et al. Security in internet of things: A survey , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).
[92] Georg Carle,et al. Security Implications of Publicly Reachable Building Automation Systems , 2017, 2017 IEEE Security and Privacy Workshops (SPW).
[93] Jun Han,et al. PitchIn: Eavesdropping via Intelligible Speech Reconstruction Using Non-acoustic Sensor Fusion , 2017, 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[94] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[95] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[96] Benjamin W. P. Ramsey,et al. Defending Building Automation Systems Using DECOY Networks , 2017, Critical Infrastructure Protection.
[97] Maruf Pasha,et al. A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures , 2017, ArXiv.
[98] Kakali Chatterjee,et al. Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..
[99] Amarsinh Vidhate,et al. Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[100] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[101] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[102] Shashikant Ghumbre,et al. A survey on IoT applications, security challenges and counter measures , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).
[103] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..
[104] Raheem A. Beyah,et al. Rethinking the Honeypot for Cyber-Physical Systems , 2016, IEEE Internet Computing.
[105] Mordechai Guri,et al. An optical covert-channel to leak data through an air-gap , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[106] Romit Roy Choudhury,et al. Listening through a Vibration Motor , 2016, MobiSys.
[107] Adi Shamir,et al. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[108] Torben Weis,et al. Video recognition using ambient light sensors , 2016, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[109] Nadjib Badache,et al. Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..
[110] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[111] Robin Berthier,et al. An Internet-wide view of ICS devices , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[112] Yuqiong Sun,et al. AuDroid: Preventing Attacks on Audio Channels in Mobile Devices , 2015, ACSAC.
[113] Uma Rathore Bhatt,et al. Detection and prevention of DDOS attack in WSN for AODV and DSR using battery drain , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).
[114] Mark Mohammad Tehranipoor,et al. Protecting endpoint devices in IoT supply chain , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[115] Jonathan D. Fuller,et al. Rogue Z-Wave controllers: A persistent attack channel , 2015, 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops).
[116] Athanasios V. Vasilakos,et al. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions , 2015, J. Comput. Sci. Eng..
[117] Xiaolei Wang,et al. A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection , 2015, MCS '15.
[118] Guowei Wu,et al. Maximizing destructiveness of node capture attack in wireless sensor networks , 2015, The Journal of Supercomputing.
[119] Ernesto Damiani,et al. From Security to Assurance in the Cloud , 2015, ACM Comput. Surv..
[120] Shivam Bhasin,et al. A survey on hardware trojan detection techniques , 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS).
[121] Trang Nguyen,et al. Using Unrestricted Mobile Sensors to Infer Tapped and Traced User Inputs , 2015, 2015 12th International Conference on Information Technology - New Generations.
[122] Zhi Xu,et al. SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones , 2015, CODASPY.
[123] Neil Savage,et al. Visualizing sound , 2015, Commun. ACM.
[124] Panwit Tuwanut,et al. A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends , 2015 .
[125] Asmita Kashid,et al. Security Issues in Internet of Things (IoT): A Survey , 2015 .
[126] Tobias Zillner,et al. ZigBee Exploited The good , the bad and the ugly , 2015 .
[127] Raheem A. Beyah,et al. Sensory channel threats to Cyber Physical Systems: A wake-up call , 2014, 2014 IEEE Conference on Communications and Network Security.
[128] Othman O. Khalifa,et al. Human activity recognition for video surveillance using sequences of postures , 2014, The Third International Conference on e-Technologies and Networks for Development (ICeND2014).
[129] Xuxian Jiang,et al. Design and implementation of an Android host-based intrusion prevention system , 2014, ACSAC.
[130] Alvin S. Lim,et al. Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..
[131] Keijo Haataja,et al. Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned , 2014, 2014 14th International Conference on Hybrid Intelligent Systems.
[132] Sajjan G. Shiva,et al. A survey of cloud computing taxonomies: Rationale and overview , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[133] Jan-Michael Frahm,et al. Watching the Watchers: Automatically Inferring TV Content From Outdoor Light Effusions , 2014, CCS.
[134] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[135] Shih-Hao Hung,et al. DroidDolphin: a dynamic Android malware detection framework using big data and machine learning , 2014, RACS '14.
[136] Frédo Durand,et al. The visual microphone , 2014, ACM Trans. Graph..
[137] Guevara Noubir,et al. Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning , 2014, WiSec '14.
[138] Landon P. Cox,et al. TaintDroid , 2014 .
[139] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[140] Raphael Spreitzer,et al. PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices , 2014, SPSM@CCS.
[141] Todd R. Andel,et al. Exploring security in ZigBee networks , 2014, CISR '14.
[142] Mahmoud Khasawneh,et al. A Survey on Wi-Fi Protocols: WPA and WPA2 , 2014, SNDS.
[143] Farrukh Shahzad,et al. State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.
[144] Mário M. Freire,et al. Security issues in cloud environments: a survey , 2014, International Journal of Information Security.
[145] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[146] Guevara Noubir,et al. Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[147] John F Miller,et al. Supply Chain Attack Framework and Attack Patterns , 2013 .
[148] Ahmed Mubarak Ahmed Al-Haiqi,et al. Keystrokes Inference Attack on Android: A Comparative Evaluation of Sensors and Their Fusion , 2013 .
[149] Jianfeng Wang,et al. Zigbee light link and its applicationss , 2013, IEEE Wireless Communications.
[150] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[151] Eric Wustrow,et al. ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.
[152] Ramjee Prasad,et al. Jamming attack: Behavioral modelling and analysis , 2013, Wireless VITAE 2013.
[153] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[154] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[155] Behrang Fouladi,et al. Security Evaluation of the Z-Wave Wireless Protocol , 2013 .
[156] Sungyoung Lee,et al. A novel intrusion detection framework for wireless sensor networks , 2013, Personal and Ubiquitous Computing.
[157] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.
[158] C. Jayakumar,et al. Node capture attack in Wireless Sensor Network: A survey , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[159] M. Sasi Kumar,et al. Detection of jamming style DoS attack in Wireless Sensor Network , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[160] Jian Wang,et al. Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[161] Romit Roy Choudhury,et al. Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.
[162] Hao Chen,et al. On the Practicality of Motion Based Keystroke Inference Attack , 2012, TRUST.
[163] Celia Gorman,et al. Counterfeit chips on the rise , 2012 .
[164] Zhi Xu,et al. TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors , 2012, WISEC '12.
[165] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[166] United Arab Emirates,et al. BLUETOOTH SECURITY THREATS AND SOLUTIONS : A SURVEY , 2012 .
[167] David G. Holmberg,et al. BACnet wide area network security threat assessment , 2011 .
[168] Joe Kissell,et al. Securing Your Wireless Network , 2011 .
[169] Patrick Traynor,et al. (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers , 2011, CCS '11.
[170] Ivan Martinovic,et al. Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.
[171] C. Muthu Ramya,et al. Study on ZigBee technology , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[172] Ashok Kumar Turuk,et al. A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[173] Alekha Kumar Mishra,et al. Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[174] İnan Güler,et al. A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks , 2011 .
[175] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[176] Shio Kumar Singh,et al. A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .
[177] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[178] Radha Poovendran,et al. Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).
[179] Ying Wang,et al. Practical Defense against WEP and WPA-PSK Attack for WLAN , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).
[180] Hervé Guyennet,et al. Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.
[181] John Paul Dunning,et al. Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.
[182] Joseph G. Tront,et al. Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[183] Radha Poovendran,et al. Probabilistic Analysis of Covering and Compromise in Node Capture Attacks , 2010 .
[184] Keijo Haataja,et al. Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures , 2010, IEEE Transactions on Wireless Communications.
[185] François-Xavier Standaert,et al. Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.
[186] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[187] Jiang Li,et al. Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .
[188] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[189] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[190] Arash Habibi Lashkari,et al. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[191] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[192] Martin Vuagnoux,et al. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards , 2009, USENIX Security Symposium.
[193] Swarup Bhunia,et al. Security through obscurity: An approach for protecting Register Transfer Level hardware IP , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[194] Sajal K. Das,et al. Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.
[195] Miron Abramovici,et al. Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.
[196] Li Xiao,et al. Securing Sensor Nodes Against Side Channel Attacks , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[197] K. Haataja,et al. Practical Man-in-the-Middle Attacks Against Bluetooth Secure Simple Pairing , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[198] S. Bhunia,et al. Hardware protection and authentication through netlist level obfuscation , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[199] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[200] Akihiro Tsutsui,et al. Latest Trends in Home Networking Technologies , 2008, IEICE Trans. Commun..
[201] Jeffrey J. P. Tsai,et al. A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[202] Yuanyuan Zhou,et al. Designing and Implementing Malicious Hardware , 2008, LEET.
[203] K. Hypponen,et al. Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.
[204] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[205] Dong Seong Kim,et al. Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[206] K. Hypponen,et al. “Nino” man-in-the-middle attack on bluetooth secure simple pairing , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[207] Andrea Bittau,et al. BlueSniff: Eve Meets Alice and Bluetooth , 2007, WOOT.
[208] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[209] J.G. Tront,et al. Battery Exhaustion Attack Detection with Small Handheld Mobile Computers , 2007, 2007 IEEE International Conference on Portable Information Devices.
[210] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[211] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[212] Andreas Strikos. A full approach for Intrusion Detection in Wireless Sensor Networks , 2007 .
[213] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[214] Miya Knight,et al. Wireless security - How safe is Z-wave? , 2006 .
[215] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[216] Daniel C. Nash,et al. An Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computers , 2005 .
[217] Ivan Stojmenović,et al. Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.
[218] John A. Stankovic,et al. A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.
[219] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[220] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[221] Sean W. Smith,et al. A Survey of WPA and 802.11i RSN Authentication Protocols , 2004 .
[222] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[223] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[224] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[225] Nicholas Wells,et al. BusyBox: A Swiss Army Knife for Linux , 2000 .
[226] Peter Smulders,et al. The threat of information theft by reception of electromagnetic radiation from RS-232 cables , 1990, Comput. Secur..
[227] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[228] Jon Postel,et al. Internet Standard Subnetting Procedure , 1985, RFC.
[229] Usn,et al. Electromagnetic Scattering and Radiation by Arbitrary Configurations of Conducting Bodies and Wires , 2022 .
[230] Smart to Smarter : Smart Home Systems History , Future and Challenges , 2022 .