Filters








4 Hits in 0.93 sec

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
However, at the same time, numerous threats to the availability and privacy of the user data, message and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical  ...  In the end, we propose a composite guideline for the development of an IoT security framework based on industry best practices and also highlight lessons learned, pitfalls and the open research challenges  ...  Privacy-Preserving Data Aggregation and Processing Privacy is a critical security requirement for IoT users.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

The role of Social Engineering in evolution of attacks

E Frumento, R Puricelli, F Freschi, D Ariu, N Weiss, C Dambra, I Cotoi, P Roccetti, M Rodriguez, L Adrei, G Marinelli, G Kandela (+1 others)
unpublished
The social engineers of the future will have to cope with the consequences of this new legislation and adapt their techniques to this new reality. 8.  ...  Figure 13 reports a simplified user-centric model of the modern way of working.  ...  infrastructures to evade IP blacklisting (3) , human workers solving CAPTCHAs (4) and SMS verification challenge farms reliant on foreign SIMs (5) .  ... 
fatcat:bnumnp2eazft7lbxmvmnvxsr3y

ICDS 2013 Technical Program Committee

Freimut Bodendorf, Adolfo Villafiorita, Bruno Kessler, Italy Senthil Kumar, Adolfo Villafiorita, Bruno Kessler, Glenn Dardick, Freimut Bodendorf, Adolfo Villafiorita, Bruno Kessler, Italy Senthil Kumar, Abolfazl Mir (+116 others)
unpublished
Information technologies allow optimization in searching an interpreting data, yet special constraints imposed by the digital society require on-demand, ethics, and legal aspects, as well as user privacy  ...  Management of geographical and temporal information becomes a challenge, in terms of volume, speed, semantic, decision, and delivery.  ...  Qijun Zhao from Michigan State University, for their valuable suggestions, comments, and for sharing the DAPM pore extraction source code.  ... 
fatcat:hgewraut4rdgjpk4mqz4z3uia4

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+115 others)
2017 International Journal of Network Security   unpublished
Currently , the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer.  ...  With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications.  ...  We are grateful to the reviewers for their valuable suggestions. Acknowledgment We would like to thank the anonymous reviewers for their valuable comments and suggestions.  ... 
fatcat:vy4pp4thsfcrpakpwdjmdgjuoy