Open Access
BIO Web Conf.
Volume 86, 2024
International Conference on Recent Trends in Biomedical Sciences (RTBS-2023)
Article Number 01084
Number of page(s) 8
Published online 12 January 2024
  • N. X. Arreaga, G. M. Enriquez, S. Blanc, and R. Estrada, “Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST,” Procedia Comput Sci, vol. 224, pp. 223–230, 2023, doi: 10.1016/J.PROCS.2023.09.031. [CrossRef] [Google Scholar]
  • B. Kaur et al., “Internet of Things (IoT) security dataset evolution: Challenges and future directions,” Internet of Things (Netherlands), vol. 22, Jul. 2023, doi: 10.1016/j.iot.2023.100780. [Google Scholar]
  • I. Zakariyya, H. Kalutarage, and M. O. Al-Kadri, “Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring,” Comput Secur, vol. 133, Oct. 2023, doi: 10.1016/j.cose.2023.103388. [CrossRef] [Google Scholar]
  • S. A. Bakhsh, M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali, and J. Ahmad, “Enhancing IoT network security through deep learning-powered Intrusion Detection System,” Internet of Things, p. 100936, Dec. 2023, doi: 10.1016/j.iot.2023.100936. [Google Scholar]
  • C. Braghin, M. Lilli, and E. Riccobene, “A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study,” Comput Secur, vol. 127, Apr. 2023, doi: 10.1016/j.cose.2022.103037. [CrossRef] [Google Scholar]
  • F. Lonetti, A. Bertolino, and F. Di Giandomenico, “Model-based security testing in IoT systems: A Rapid Review,” Inf Softw Technol, vol. 164, Dec. 2023, doi: 10.1016/j.infsof.2023.107326. [CrossRef] [Google Scholar]
  • S. Javanmardi, M. Shojafar, R. Mohammadi, M. Alazab, and A. M. Caruso, “An SDN perspective IoT-Fog security: A survey,” Computer Networks, vol. 229, Jun. 2023, doi: 10.1016/j.comnet.2023.109732. [CrossRef] [Google Scholar]
  • E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of IoT security,” Comput Sci Rev, vol. 44, May 2022, doi: 10.1016/j.cosrev.2022.100467. [CrossRef] [Google Scholar]
  • S. Rudrakar and P. Rughani, “IoT based agriculture (Ag-IoT): A detailed study on architecture, security and forensics,” Information Processing in Agriculture, Sep. 2023, doi: 10.1016/j.inpa.2023.09.002. [Google Scholar]
  • I. Nadir, H. Mahmood, and G. Asadullah, “A taxonomy of IoT firmware security and principal firmware analysis techniques,” International Journal of Critical Infrastructure Protection, vol. 38, Sep. 2022, doi: 10.1016/j.ijcip.2022.100552. [CrossRef] [Google Scholar]
  • C. Alex, G. Creado, W. Almobaideen, O. A. Alghanam, and M. Saadeh, “A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms,” Comput Secur, vol. 132, Sep. 2023, doi: 10.1016/j.cose.2023.103283. [CrossRef] [Google Scholar]
  • J. P. A. Yaacoub, H. N. Noura, and O. Salman, “Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 155–179, Jan. 2023, doi: 10.1016/j.iotcps.2023.04.001. [CrossRef] [Google Scholar]
  • N. Chaurasia and P. Kumar, “A comprehensive study on issues and challenges related to privacy and security in IoT,” e-Prime - Advances in Electrical Engineering, Electronics and Energy, vol. 4, Jun. 2023, doi: 10.1016/ [CrossRef] [Google Scholar]
  • F. Thabit, O. Can, A. O. Aljahdali, G. H. Al-Gaphari, and H. A. Alkhzaimi, “Cryptography Algorithms for Enhancing IoT Security,” Internet of Things (Netherlands), vol. 22, Jul. 2023, doi: 10.1016/j.iot.2023.100759. [Google Scholar]
  • V. Gugueoth, S. Safavat, S. Shetty, and D. Rawat, “A review of IoT security and privacy using decentralized blockchain techniques,” Comput Sci Rev, vol. 50, Nov. 2023, doi: 10.1016/j.cosrev.2023.100585. [CrossRef] [Google Scholar]
  • J. Wang, W. Yi, M. Yang, J. Ma, S. Zhang, and S. Hao, “Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain,” Journal of Network and Computer Applications, vol. 218, Sep. 2023, doi: 10.1016/j.jnca.2023.103718. [CrossRef] [Google Scholar]
  • “Enhancing Home Security with IoT Devices: A Vulnerability Analysis Using the IoT Security Test - Search |” Accessed: Oct. 27, 2023. [Online]. Available: [Google Scholar]
  • S. Rizvi et al., “A modular framework for auditing IoT devices and networks,” Comput Secur, vol. 132, Sep. 2023, doi: 10.1016/j.cose.2023.103327. [CrossRef] [Google Scholar]
  • A. Bhardwaj, K. Kaushik, S. Bharany, and S. Kim, “Forensic analysis and security assessment of IoT camera firmware for smart homes,” Egyptian Informatics Journal, vol. 24, no. 4, p. 100409, Dec. 2023, doi: 10.1016/J.EIJ.2023.100409. [CrossRef] [Google Scholar]
  • B. Zahednejad and C. Gao, “A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics,” Internet of Things, p. 100937, Dec. 2023, doi: 10.1016/j.iot.2023.100937. [Google Scholar]
  • A. Zohourian et al., “IoT Zigbee device security: A comprehensive review,” Internet of Things (Netherlands), vol. 22, Jul. 2023, doi: 10.1016/j.iot.2023.100791. [Google Scholar]
  • M. Mahbub, “Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics,” Journal of Network and Computer Applications, vol. 168, Oct. 2020, doi: 10.1016/j.jnca.2020.102761. [CrossRef] [Google Scholar]
  • A. Gerodimos, L. Maglaras, M. A. Ferrag, N. Ayres, and I. Kantzavelou, “IoT: Communication protocols and security threats,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 1–13, Jan. 2023, doi: 10.1016/j.iotcps.2022.12.003. [CrossRef] [Google Scholar]
  • P. Nayak and G. Swapna, “Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview,” Internet of Things (Netherlands), vol. 21, Apr. 2023, doi: 10.1016/j.iot.2022.100641. [Google Scholar]
  • F. Zerrouki, S. Ouchani, and H. Bouarfa, “T2S-MAKEP and T2T-MAKEP: A PUF-based Mutual Authentication and Key Exchange Protocol for IoT devices,” Internet of Things, vol. 24, p. 100953, Dec. 2023, doi: 10.1016/J.IOT.2023.100953. [CrossRef] [Google Scholar]
  • M. Barari and R. Saifan, “Energy–Aware security protocol for IoT devices,” Pervasive Mob Comput, vol. 96, Dec. 2023, doi: 10.1016/j.pmcj.2023.101847. [CrossRef] [Google Scholar]
  • Md. Z. ul Haq, H. Sood, and R. Kumar, “Effect of using plastic waste on mechanical properties of fly ash based geopolymer concrete,” Mater Today Proc, 2022. [Google Scholar]
  • A. Kumar, N. Mathur, V. S. Rana, H. Sood, and M. Nandal, “Sustainable effect of polycarboxylate ether based admixture: A meticulous experiment to hardened concrete,” Mater Today Proc, 2022. [Google Scholar]
  • V. S. Rana et al., “Correction: Assortment of latent heat storage materials using multi criterion decision making techniques in Scheffler solar reflector,” International Journal on Interactive Design and Manufacturing (IJIDeM), p. 1, 2023. [Google Scholar]
  • K. Kumar et al., “From Homogeneity to Heterogeneity: Designing Functionally Graded Materials for Advanced Engineering Applications,” in E3S Web of Conferences, EDP Sciences, 2023, p. 01198. [Google Scholar]
  • M. Z. ul Haq et al., “Waste Upcycling in Construction: Geopolymer Bricks at the Vanguard of Polymer Waste Renaissance,” in E3S Web of Conferences, EDP Sciences, 2023, p. 01205. [Google Scholar]
  • M. Z. ul Haq et al., “Circular Economy Enabler: Enhancing High-Performance Bricks through Geopolymerization of Plastic Waste,” in E3S Web of Conferences, EDP Sciences, 2023, p. 01202. [Google Scholar]
  • S. Chowdhury et al., “Laser powder bed fusion: a state-of-the-art review of the technology, materials, properties & defects, and numerical modelling,” Journal of Materials Research and Technology, vol. 20, pp. 2109–2172, Sep. 2022, doi: 10.1016/J.JMRT.2022.07.121. [CrossRef] [Google Scholar]
  • A. Saood et al., “Influence of Fiber Angle on Steady-State Response of Laminated Composite Rectangular Plates,” Materials, vol. 15, no. 16, Aug. 2022, doi: 10.3390/MA15165559. [CrossRef] [PubMed] [Google Scholar]
  • S. Bhardwaj, P. Singh, and S. Dixit, “Linear dynamic analysis of high-rise irregular structures with or without LFRS & frictional damper,” Mater Today Proc, vol. 69, pp. 499–507, Jan. 2022, doi: 10.1016/J.MATPR.2022.09.256. [CrossRef] [Google Scholar]
  • D. Goyal, R. K. Dang, T. Goyal, K. K. Saxena, K. A. Mohammed, and S. Dixit, “Graphene: A Path-Breaking Discovery for Energy Storage and Sustainability,” Materials, vol. 15, no. 18, Sep. 2022, doi: 10.3390/MA15186241. [Google Scholar]
  • D. Choudhary, P. Singh, K. Araszkiewicz, and S. Dixit, “Experimental analysis of defects in concrete structures,” Mater Today Proc, vol. 69, pp. 401–405, Jan. 2022, doi: 10.1016/J.MATPR.2022.09.067. [CrossRef] [Google Scholar]
  • Siddique, A., Kandpal, G. and Kumar, P., 2018. Proline accumulation and its defensive role under diverse stress condition in plants: An overview. Journal of Pure and Applied Microbiology, 12(3), pp.1655-1659. [CrossRef] [Google Scholar]
  • Singh, H., Singh, J.I.P., Singh, S., Dhawan, V. and Tiwari, S.K., 2018. A brief review of jute fibre and its composites. Materials Today: Proceedings, 5(14), pp.28427-28437. [CrossRef] [Google Scholar]
  • Akhtar, N. and Bansal, J.G., 2017. Risk factors of Lung Cancer in nonsmoker. Current problems in cancer, 41(5), pp.328-339. [CrossRef] [PubMed] [Google Scholar]
  • Mahajan, N., Rawal, S., Verma, M., Poddar, M. and Alok, S., 2013. A phytopharmacological overview on Ocimum species with special emphasis on Ocimum sanctum. Biomedicine & Preventive Nutrition, 3(2), pp.185-192. [CrossRef] [Google Scholar]
  • Vinnik, D.A., Zhivulin, V.E., Sherstyuk, D.P., Starikov, A.Y., Zezyulina, P.A., Gudkova, S.A., Zherebtsov, D.A., Rozanov, K.N., Trukhanov, S.V., Astapovich, K.A. and Turchenko, V.A., 2021. Electromagnetic properties of zinc–nickel ferrites in the frequency range of 0.05–10 GHz. Materials Today Chemistry, 20, p.100460. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.