2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) 2022
DOI: 10.1109/iceccme55909.2022.9987845
|View full text |Cite
|
Sign up to set email alerts
|

Dependability of the Internet of Things: Current Status and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(18 citation statements)
references
References 44 publications
0
18
0
Order By: Relevance
“…Failure analysis is a systematic approach to investigate and comprehend the underlying causes of failures in various systems, products, or processes [26]. The primary objective of failure analysis is to prevent similar failures from happening in the future [12]. Failure analysis is extensively employed to analyse potential safety-related issues in domains where safety is critical.…”
Section: Overview Of Manual Failure Analysis Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Failure analysis is a systematic approach to investigate and comprehend the underlying causes of failures in various systems, products, or processes [26]. The primary objective of failure analysis is to prevent similar failures from happening in the future [12]. Failure analysis is extensively employed to analyse potential safety-related issues in domains where safety is critical.…”
Section: Overview Of Manual Failure Analysis Methodsmentioning
confidence: 99%
“…On the other hand, quantitative analysis uses failure rates of components or probabilities of root causes to predict system failure. Considering the type of logic gates used between events, the system failure probability can be calculated [12,20].…”
Section: Fault Tree Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, they describe the types of VPNs to be categorized into consumer, enterprise and site-to-site VPNs. Consumer VPNs provide security and privacy of users internet traffic and are typically used to overcome restrictions for example those imposed by internet providers [24][25][26]. On the other hand, enterprise VPNs comprise of connections to enterprise networks for remote users.…”
Section: Virtual Private Network Origination and Typesmentioning
confidence: 99%