2020
DOI: 10.17705/1cais.04621
|View full text |Cite
|
Sign up to set email alerts
|

The Internet of Things: Multi-faceted Research Perspectives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 0 publications
0
15
0
Order By: Relevance
“…With our work, we want to draw attention to the growing need to pay more attention to U&P in practice. We contribute to the pressing problem of unpatched IoT devices [3], [82] and identify factors that influence their patch status. The results suggest that devices of particular manufacturers are updated much more frequently than those of others.…”
Section: Discussion and Contributionmentioning
confidence: 99%
“…With our work, we want to draw attention to the growing need to pay more attention to U&P in practice. We contribute to the pressing problem of unpatched IoT devices [3], [82] and identify factors that influence their patch status. The results suggest that devices of particular manufacturers are updated much more frequently than those of others.…”
Section: Discussion and Contributionmentioning
confidence: 99%
“…Our work relates to three domains of related work: model-driven security engineering, attack/defense graphs, and architecture modeling for system analysis. 1 https://www.cnet.com/news/solarwinds-hack-officially-blamed-on-russia-what-you-need-toknow/ 2 https://www.industrialdefender.com/florida-water-treatment-plant-cyber-attack/ 3 https://www.cbsnews.com/news/millions-facebook-user-records-exposed-amazon-cloud-server/…”
Section: Related Workmentioning
confidence: 99%
“…If a source collected for a keyword is classified as Blogs by ST and Less than 1 year by TP, then we applied their parameterized heuristic values P(ST = Blogs) and P(TP = Less than 1 year) from Table 1. Next, we calculated the overall credibility C source according to Equation (1). For instance, the source [46] was collected for the keyword resourceHijacking and was classified into Analyst papers and Less than 1 year.…”
Section: Evaluate Information Sources By Credibility Assessmentmentioning
confidence: 99%
See 1 more Smart Citation
“…In several IoT applications, the process of analysis must be done instantly, and response or preventive action must be taken immediately, which means that the opportunity to prevent potential damage decreases during the data transmission from the device to the cloud for analysis. Cisco has published a report about such a difficult challenge that disrupts IoT systems, and as the report indicates, IoT systems need to a developed new computing model to deal with the variety, rapidity, and quantity of IoT data [7]. Therefore, Instead of using centralized clouds, decentralized resources at the network's edges can be used to process data that is close to the users in fog computing [8,9].…”
Section: Introductionmentioning
confidence: 99%