2021
DOI: 10.1007/978-3-030-68887-5_9
|View full text |Cite
|
Sign up to set email alerts
|

Asset-Driven Approach for Security Risk Assessment in IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…Christensen et al [48] conduct an assessment of evaluation targets, which consists of multiple assets, and identified the components that an attacker would consider valuable. Finally, Chehida et al [47] use an IoT domain model to aid in finding assets, which helps to avoid overlapping labels for assets.…”
Section: Identification Of Iot Assetsmentioning
confidence: 99%
See 4 more Smart Citations
“…Christensen et al [48] conduct an assessment of evaluation targets, which consists of multiple assets, and identified the components that an attacker would consider valuable. Finally, Chehida et al [47] use an IoT domain model to aid in finding assets, which helps to avoid overlapping labels for assets.…”
Section: Identification Of Iot Assetsmentioning
confidence: 99%
“…Zahra and Abdelhamid [76] suggest that the context state of an IoT risk framework involves not only the collection of assets but the types of risk actors and stakeholders that could be impacted by an attack. Despite this, there is a significant lack of IoT cyber risk management frameworks that prioritise users, for example, users may be expressed as another asset type [47] rather than an individual entity. Researchers have suggested different approaches to mapping assets and users to threats.…”
Section: Identification Of Usersmentioning
confidence: 99%
See 3 more Smart Citations