2022
DOI: 10.1016/j.compeleceng.2022.108212
|View full text |Cite
|
Sign up to set email alerts
|

Using honeypots to model botnet attacks on the internet of medical things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Valence refers to the combining power of an image, especially as measured by the number of atomic regions that can displace or combine with other regions; possible vulnerability is potential for image breaches which properly expose private image data of responsible persons to undesirable doers; virtualization tries to create a virtual representation of real-world entities or processes; visualization shows image through visualization tools in challenging due image volume and considerable variety and sufficient velocity; vicinity expresses the main area or region of a valuable image is free, available, or unoccupied; vitality indicates the state of being a strong and active state of the image area for processing or growth; social value remains comfortably an intellectual ability to typically produce helpful image results like better insights; and key decisions resulting in improved customer service, better products, more considerable revenue, reduced cost or managed risk. Also, a new approach binding distributed local data processing due to using local agents and intelligence negotiations in an agent-based model or global knowledge extraction by transferring intelligence bots in a bot-oriented model for IoMT in smart cities (SC) is a critical decision [30].…”
Section: Big Image Data Dimensionsmentioning
confidence: 99%
“…Valence refers to the combining power of an image, especially as measured by the number of atomic regions that can displace or combine with other regions; possible vulnerability is potential for image breaches which properly expose private image data of responsible persons to undesirable doers; virtualization tries to create a virtual representation of real-world entities or processes; visualization shows image through visualization tools in challenging due image volume and considerable variety and sufficient velocity; vicinity expresses the main area or region of a valuable image is free, available, or unoccupied; vitality indicates the state of being a strong and active state of the image area for processing or growth; social value remains comfortably an intellectual ability to typically produce helpful image results like better insights; and key decisions resulting in improved customer service, better products, more considerable revenue, reduced cost or managed risk. Also, a new approach binding distributed local data processing due to using local agents and intelligence negotiations in an agent-based model or global knowledge extraction by transferring intelligence bots in a bot-oriented model for IoMT in smart cities (SC) is a critical decision [30].…”
Section: Big Image Data Dimensionsmentioning
confidence: 99%
“…A honeypot is a deceptive trap in the network that pretends to be a regular host. When the malicious nodes communicate with a honeypot, they are closely monitored and detected [20]. The behavior of the Proof and a honeypot is similar.…”
Section: Proposed Detection Strategiesmentioning
confidence: 99%
“…Wang et al [ 13 ] found a correlation between the pandemic timeline and the attacks generated among IoT networks. This work analyzed critical security problems of the IoT environment through honeypot principles.…”
Section: Introductionmentioning
confidence: 99%