6 Hits in 7.2 sec

A Review on Internet of Things (IoT): Security Challenges, Issuesand the Countermeasures approaches

Dr. B. Sundaravadivazhagan, Dr. B. Subashini, Mr. Mohemed Ashik M
2021 Psychology (Savannah, Ga.)  
This study has detailed review of IoT layered design, each of these layers having lot of security challenges such as threats, vulnerabilities and attacks.  ...  In the present scenario, Internet of Things is playing vital role in the next era of communication.  ...  The proposed security framework assists in the identification, recovery and defense of threats to IoT infrastructure.  ... 
doi:10.17762/pae.v58i2.3188 fatcat:bzgximmiazdjzh3iq2z4texjdi

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Pooja Anand, Yashwant Singh, Arvind Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar
2020 IEEE Access  
Motivated by these facts, in this paper, we explore the evolving vulnerabilities in IoT devices. We provide a state-of-the-art survey that addresses multiple dimensions of the IoT realm.  ...  Subsequently, we explore the open-source tools and datasets for the proliferation in research and growth of IoT.  ...  We have examined many such correlated surveys to find their contributions and illustrate how the present study progresses the state-of-the-art in terms of IoT security.  ... 
doi:10.1109/access.2020.3022842 fatcat:ifkplk2lsjhupkt4c42fovqpta

Santé numérique : quelques réflexions sur les modèles économiques et les questions posées à la régulation [chapter]

Dominique Polton
2018 Santé, numérique et droit-s  
, treatment, alleviation of or compensation for an injury or disability, -investigation, replacement or modification of the anatomy or of a physiological or pathological process or state, -providing information  ...  by means of in vitro examination of specimens derived from the human body, including organ, blood and tissue donations, and which does not achieve its principal intended action by pharmacological, immunological  ...  Communication Contribuer à la mise en valeur des outils de qualité Des Best-Of sont régulièrement mis à la disposition des médias.  ... 
doi:10.4000/books.putc.4454 fatcat:l3y6efyhybc6zcdhpnm4ioniai

Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019

Naseem Naqvi
2019 The Journal of British Blockchain Association  
The discovery of a recent botnet that was discovered to be cleaning up bad botnets was observed in the wild using Emercoin's distributed DNS implementation [17] .  ...  Among them included the use of internet-of-things (IoT) to streamline infrastructure for trade information sharing, where NEDO operated in partnership with NTT Data.  ...  Liew, "Hedge fund index investing examined," Journal of Portfolio Management, vol. 29, no. 2, p. 113, 2003 . [17] W. F.  ... 
doi:10.31585/jbba-2-2-(full)2019 fatcat:lsnv4wnuhvhpne33puatdc4p4e

Identity and identification [chapter]

Identity and Identification in India  
It covers four main areas: • An overview of the UK's forensic science landscape from the perspective of its users • The changing nature of crime (including cybercrime), examining how forensic science can  ...  The first is the summary report of the Government Chief Scientific Adviser. This was developed as a result of seminars and the advice of the experts who provided the source of the evidence.  ...  fashionably Enjoyable and Disposable) 2 .  ... 
doi:10.4324/9780203401934_chapter_1 fatcat:2yj6d5jpqveszil53hr6qiay4a

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM), Summer Semester 2018 [article]

Georg Carle, Daniel Raumer, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
development of the full potential of the IoT [13] .  ...  REFERENCES[1] The mirai botnet: all about the latest malware ddos attack type. https: // mirai-botnet-ddos-attack.html.  ... 
doi:10.2313/net-2018-11-1 fatcat:bnh7d4o7pna4njsnu52zvjcsou