References
- A. Prakash, M. Satish, T. Sri Sai Bhargav, N. Bhalaji, Detection and Mitigation of Denial of Service Attacks Using Stratified Architecture, Procedia Computer Science, Vol 87, 2016, pp. 275-280. https://doi.org/10.1016/j.procs.2016.05.161
- Distributed Denialof-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms in Advance Computing Conference, 2009. IACC 2009. IEEE International (2009), pp. 1275-1280
- Jonathan D. Fuller, Benjamin W. Ramsey, Mason J. Rice, John M. Pecarina, Misuse-based detection of Z-Wave network attacks, Computers & Security, Vol 64, 2017, pp 44-58, https://doi.org/10.1016/j.cose.2016.10.003
- Williams CM, Chaturvedi R, Chakravarthy K Cybersecurity Risks in a Pandemic J Med Internet Res 2020 vol. 22, no. 9, e23692 doi: 10.2196/23692
- Keskin, O.F.; Caramancion, K.M.; Tatar, I.; Raza, O.; Tatar, U. Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports. Electronics 2021, 10, 1168. https://doi.org/10.3390/electronics10101168
- Boyes, Hugh, Bil Hallaq, Joe Cunningham, and Tim Watson. 2018. The Industrial Internet of Things (IIoT): An Analysis Framework. Computers in Industry 101: 1-12. https://doi.org/10.1016/j.compind.2018.04.015
- S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of iot: Applications, challenges, and opportunities with china perspective," IEEE Internet of Things journal, vol. 1, no. 4, pp. 349-359, 2014. https://doi.org/10.1109/JIOT.2014.2337336
- Lin, Shi-Wan, Brandford Miller, Jacques Durand, Graham Bleakley, Amine Chigani, Robert Martin, Brett Murphy, and Mark Crawford. 2019. The Industrial Internet of Things Volume G1: Reference Architecture V1.90. Industrial Internet Consortium, June. Accessed January 2022. https://www.iiconsortium.org/pdf/IIRA-v1.9.pdf
- J. Fuller, B. Ramsey, Rogue Z-Wave Controllers: A Persistent Attack Channel, in: 10th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), 2015, pp. 734-741
- B. Ramsey, B. Mullins, Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks, in: J. Butts, S. Shenoi (Eds.), Critical Infrastructure Protection VII, Vol. 417 of IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2013, pp. 63-79
- Gritzalis, D.; Stergiopoulos, G.; Vasilellis, E.; Anagnostopoulou, A. Readiness Exercises: Are Risk Assessment Methodologies Ready for the Cloud. In Advances in Core Computer Science-Based Technologies; Springer: Cham, Switzerland, 2021.
- Desnitsky, V.; Kotenko, I. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks. In Econometrics for Financial Applications; Springer Science and Business Media LLC: Berlin, Germany, 2017; Volume 737, pp. 263-270.
- Noshina Tariq, Farrukh Aslam Khan, Muhammad Asim, Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis, Procedia Computer Science, Vol 191, 2021, pp 425-430, https://doi.org/10.1016/j.procs.2021.07.053..
- M. Tariq, H. Majeed, M.O. Beg, F.A. Khan, A. Derhab Accurate detection of sitting posture activities in a secure iot based assisted living environment Future Generation Computer Systems, 92 (2019), pp. 745-757 https://doi.org/10.1016/j.future.2018.02.013
- S. Shukla Reliable critical nodes detection for internet of things (iot) Wireless Networks, 27 (4) (2021), pp. 2931-2946 https://doi.org/10.1007/s11276-021-02603-4
- G. M. Koien, "Reflections on trust in devices: an informal survey of human trust in an internet-of-things context," Wireless Personal Communications, vol. 61, no. 3, pp. 495-510, 2011. https://doi.org/10.1007/s11277-011-0386-4
- Rachit, Bhatt, S. & Ragiri, P.R. Security trends in Internet of Things: a survey. SN Appl. Sci. 3, 121 (2021) https://doi.org/10.1007/s42452-021-04156-9
- Babaei A, Schiele G (2019) Physical unclonable functions in the Internet of Things: state of the art and open challenges. Sensors 19(14):3208 https://doi.org/10.3390/s19143208
- Om Kumar CU, Bhama PRKS (2019) Detecting and confronting flash attacks from IoT botnets. J Supercomput 75(12):8312-8338 https://doi.org/10.1007/s11227-019-03005-2
- Aldaej A (2019) Enhancing cyber security in modern Internet of things (IoT) using intrusion prevention algorithm for IoT (IPAI). IEEE Access. https://doi.org/10.1109/ACCESS.2019.2893445
- Alshehri MD, Hussain FK (2019) A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). Computing 101(7):791-818 https://doi.org/10.1007/s00607-018-0685-7
- Yuchong Li, Qinghui Liu, A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments, Energy Reports, Volume 7, 2021, Pages 8176-8186 https://doi.org/10.1016/j.egyr.2021.08.126
- Priyadarshini I., et al, Identifying cyber insecurities in trustworthy space and energy sector for smart grids, Comput. Electr. Eng., 93 (2021), Article 107204
- Ogbanufe O, Enhancing end-user roles in information security: Exploring the setting, situation, and identity, Comput Secur., 108 (2021), Article 102340.
- Niraja K.S., Srinivasa Rao S, A hybrid algorithm design for near real time detection cyber attacks from compromised devices to enhance IoT security, Mater. Today: Proc. (2021