2019
DOI: 10.1109/mitp.2018.2883858
|View full text |Cite
|
Sign up to set email alerts
|

IoT Safety: State of the Art

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 2 publications
0
5
0
1
Order By: Relevance
“…In [ 13 ], While our methodology adeptly detects and addresses potential hazards and minimizes false positives/negatives during the early design phase, it’s essential to note that our proposed approach does not specifically cater to security concerns.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [ 13 ], While our methodology adeptly detects and addresses potential hazards and minimizes false positives/negatives during the early design phase, it’s essential to note that our proposed approach does not specifically cater to security concerns.…”
Section: Discussionmentioning
confidence: 99%
“…The author [ 13 ] highlights that while security concerns dominate discussions around the Internet of Things (IoT), the safety of devices is often sidelined, despite its critical importance. IoT devices are complex conglomerates of interconnected systems, making them susceptible to security breaches and device malfunction.…”
Section: Related Workmentioning
confidence: 99%
“…Si bien la computación en la nube se ha consolidado como un marco de trabajo base para las empresas, empieza un nuevo avance hacia la computación en el borde. Esta nueva computación que se incorpora por el aumento de dispositivos inteligentes conectados y enlazados con aplicaciones en la nube, los cuales serán accedidos desde dispositivos móviles (Zalewski, 2019). La computación en el borde no son nuevos dispositivos, es una decisión de arquitectura que busca disminuir la latencia de conexión y aumentar la capacidad de procesamiento para lograr la experiencia requerida al interactuar con un objeto con mayor densidad digital.…”
Section: Estrategia De Toleranciaunclassified
“…Basic security terms: threat, vulnerability, and breach, are compared to fundamental terms in safety: hazard, fault, and failure, with definitions taken from professional dictionaries developed by respective communities [6]- [7]. Additional clarification of these parallels can be found in [8].…”
Section: A Cen 3078 Software Securitymentioning
confidence: 99%