Open Access
Issue |
BIO Web Conf.
Volume 86, 2024
International Conference on Recent Trends in Biomedical Sciences (RTBS-2023)
|
|
---|---|---|
Article Number | 01085 | |
Number of page(s) | 9 | |
DOI | https://doi.org/10.1051/bioconf/20248601085 | |
Published online | 12 January 2024 |
- N. X. Arreaga, G. M. Enriquez, S. Blanc, and R. Estrada, “Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST,” Procedia Comput Sci, vol. 224, pp. 223–230, 2023, doi: 10.1016/J.PROCS.2023.09.031. [CrossRef] [Google Scholar]
- B. Kaur et al., “Internet of Things (IoT) security dataset evolution: Challenges and future directions,” Internet of Things (Netherlands), vol. 22, Jul. 2023, doi: 10.1016/j.iot.2023.100780. [Google Scholar]
- I. Zakariyya, H. Kalutarage, and M. O. Al-Kadri, “Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring,” Comput Secur, vol. 133, Oct. 2023, doi: 10.1016/j.cose.2023.103388. [CrossRef] [Google Scholar]
- S. A. Bakhsh, M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali, and J. Ahmad, “Enhancing IoT network security through deep learning-powered Intrusion Detection System,” Internet of Things, p. 100936, Dec. 2023, doi: 10.1016/j.iot.2023.100936. [Google Scholar]
- C. Braghin, M. Lilli, and E. Riccobene, “A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study,” Comput Secur, vol. 127, Apr. 2023, doi: 10.1016/j.cose.2022.103037. [CrossRef] [Google Scholar]
- S. Javanmardi, M. Shojafar, R. Mohammadi, M. Alazab, and A. M. Caruso, “An SDN perspective IoT-Fog security: A survey,” Computer Networks, vol. 229, Jun. 2023, doi: 10.1016/j.comnet.2023.109732. [CrossRef] [Google Scholar]
- E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of IoT security,” Comput Sci Rev, vol. 44, May 2022, doi: 10.1016/j.cosrev.2022.100467. [CrossRef] [Google Scholar]
- S. Rudrakar and P. Rughani, “IoT based agriculture (Ag-IoT): A detailed study on architecture, security and forensics,” Information Processing in Agriculture, Sep. 2023, doi: 10.1016/j.inpa.2023.09.002. [Google Scholar]
- I. Nadir, H. Mahmood, and G. Asadullah, “A taxonomy of IoT firmware security and principal firmware analysis techniques,” International Journal of Critical Infrastructure Protection, vol. 38, Sep. 2022, doi: 10.1016/j.ijcip.2022.100552. [CrossRef] [Google Scholar]
- C. Alex, G. Creado, W. Almobaideen, O. A. Alghanam, and M. Saadeh, “A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms,” Comput Secur, vol. 132, Sep. 2023, doi: 10.1016/j.cose.2023.103283. [CrossRef] [Google Scholar]
- J. P. A. Yaacoub, H. N. Noura, and O. Salman, “Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 155–179, Jan. 2023, doi: 10.1016/j.iotcps.2023.04.001. [CrossRef] [Google Scholar]
- N. Chaurasia and P. Kumar, “A comprehensive study on issues and challenges related to privacy and security in IoT,” e-Prime - Advances in Electrical Engineering, Electronics and Energy, vol. 4, Jun. 2023, doi: 10.1016/j.prime.2023.100158. [CrossRef] [Google Scholar]
- F. Thabit, O. Can, A. O. Aljahdali, G. H. Al-Gaphari, and H. A. Alkhzaimi, “Cryptography Algorithms for Enhancing IoT Security,” Internet of Things (Netherlands), vol. 22, Jul. 2023, doi: 10.1016/j.iot.2023.100759. [Google Scholar]
- V. Gugueoth, S. Safavat, S. Shetty, and D. Rawat, “A review of IoT security and privacy using decentralized blockchain techniques,” Comput Sci Rev, vol. 50, Nov. 2023, doi: 10.1016/j.cosrev.2023.100585. [CrossRef] [Google Scholar]
- J. Wang, W. Yi, M. Yang, J. Ma, S. Zhang, and S. Hao, “Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain,” Journal of Network and Computer Applications, vol. 218, Sep. 2023, doi: 10.1016/j.jnca.2023.103718. [CrossRef] [Google Scholar]
- “Enhancing Home Security with IoT Devices: A Vulnerability Analysis Using the IoT Security Test - Search | ScienceDirect.com.” Accessed: Oct. 27, 2023. [Online]. Available: https://www.sciencedirect.com/search?qs=Enhancing%20Home%20Security%20with%20IoT%20Devices%3A%20A%20Vulnerability%20Analysis%20Using%20the%20IoT%20Security%20Test [Google Scholar]
- S. Rizvi et al., “A modular framework for auditing IoT devices and networks,” Comput Secur, vol. 132, Sep. 2023, doi: 10.1016/j.cose.2023.103327. [CrossRef] [Google Scholar]
- A. Bhardwaj, K. Kaushik, S. Bharany, and S. Kim, “Forensic analysis and security assessment of IoT camera firmware for smart homes,” Egyptian Informatics Journal, vol. 24, no. 4, p. 100409, Dec. 2023, doi: 10.1016/J.EIJ.2023.100409. [CrossRef] [Google Scholar]
- B. Zahednejad and C. Gao, “A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics,” Internet of Things, p. 100937, Dec. 2023, doi: 10.1016/j.iot.2023.100937. [Google Scholar]
- A. Zohourian et al., “IoT Zigbee device security: A comprehensive review,” Internet of Things (Netherlands), vol. 22, Jul. 2023, doi: 10.1016/j.iot.2023.100791. [Google Scholar]
- M. Mahbub, “Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics,” Journal of Network and Computer Applications, vol. 168, Oct. 2020, doi: 10.1016/j.jnca.2020.102761. [CrossRef] [Google Scholar]
- A. Gerodimos, L. Maglaras, M. A. Ferrag, N. Ayres, and I. Kantzavelou, “IoT: Communication protocols and security threats,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 1–13, Jan. 2023, doi: 10.1016/j.iotcps.2022.12.003. [CrossRef] [Google Scholar]
- P. Nayak and G. Swapna, “Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview,” Internet of Things (Netherlands), vol. 21, Apr. 2023, doi: 10.1016/j.iot.2022.100641. [Google Scholar]
- F. Zerrouki, S. Ouchani, and H. Bouarfa, “T2S-MAKEP and T2T-MAKEP: A PUF-based Mutual Authentication and Key Exchange Protocol for IoT devices,” Internet of Things, vol. 24, p. 100953, Dec. 2023, doi: 10.1016/J.IOT.2023.100953. [CrossRef] [Google Scholar]
- M. Barari and R. Saifan, “Energy–Aware security protocol for IoT devices,” Pervasive Mob Comput, vol. 96, Dec. 2023, doi: 10.1016/j.pmcj.2023.101847. [CrossRef] [Google Scholar]
- Md. Z. ul Haq, H. Sood, and R. Kumar, “Effect of using plastic waste on mechanical properties of fly ash based geopolymer concrete,” Mater Today Proc, 2022. [Google Scholar]
- A. Kumar, N. Mathur, V. S. Rana, H. Sood, and M. Nandal, “Sustainable effect of polycarboxylate ether based admixture: A meticulous experiment to hardened concrete,” Mater Today Proc, 2022. [Google Scholar]
- H. Sood, R. Kumar, P. C. Jena, and S. K. Joshi, “Eco-friendly approach to construction: Incorporating waste plastic in geopolymer concrete,” Mater Today Proc, 2023. [Google Scholar]
- K. Kumar et al., “Understanding Composites and Intermetallic: Microstructure, Properties, and Applications,” in E3S Web of Conferences, EDP Sciences, 2023, p. 01196. [Google Scholar]
- M. Z. ul Haq et al., “Sustainable Infrastructure Solutions: Advancing Geopolymer Bricks via Eco- Polymerization of Plastic Waste,” in E3S Web of Conferences, EDP Sciences, 2023, p. 01203. [Google Scholar]
- H. D. Nguyen et al., “A critical review on additive manufacturing of Ti-6Al-4V alloy: Microstructure and mechanical properties,” Journal of Materials Research and Technology, vol. 18, pp. 4641–4661, May 2022, doi: 10.1016/J.JMRT.2022.04.055. [CrossRef] [Google Scholar]
- R. Gera et al., “A systematic literature review of supply chain management practices and performance,” Mater Today Proc, vol. 69, pp. 624–632, Jan. 2022, doi: 10.1016/J.MATPR.2022.10.203. [CrossRef] [Google Scholar]
- A. Jaswal et al., “Synthesis and Characterization of Highly Transparent and Superhydrophobic Zinc Oxide (ZnO) Film,” Lecture Notes in Mechanical Engineering, pp. 119–127, 2023, doi: 10.1007/978-981-19-4147-4_12. [Google Scholar]
- G. Ghangas, S. Singhal, S. Dixit, V. Goyat, and S. Kadiyan, “Mathematical modeling and optimization of friction stir welding process parameters for armor-grade aluminium alloy,” International Journal on Interactive Design and Manufacturing, 2022, doi: 10.1007/S12008-022-01000-1. [Google Scholar]
- G. Murali, S. R. Abid, K. Al-Lami, N. I. Vatin, S. Dixit, and R. Fediuk, “Pure and mixed-mode (I/III) fracture toughness of preplaced aggregate fibrous concrete and slurry infiltrated fibre concrete and hybrid combination comprising nano carbon tubes,” Constr Build Mater, vol. 362, Jan. 2023, doi: 10.1016/J.CONBUILDMAT.2022.129696. [CrossRef] [Google Scholar]
- V. S. Rana et al., “Assortment of latent heat storage materials using multi criterion decision making techniques in Scheffler solar reflector,” International Journal on Interactive Design and Manufacturing, 2023, doi: 10.1007/S12008-023-01456-9. [Google Scholar]
- R. Shanmugavel et al., “Al-Mg-MoS2 Reinforced Metal Matrix Composites: Machinability Characteristics,” Materials, vol. 15, no. 13, Jul. 2022, doi: 10.3390/MA15134548. [CrossRef] [PubMed] [Google Scholar]
- Siddique, A., Kandpal, G. and Kumar, P., 2018. Proline accumulation and its defensive role under diverse stress condition in plants: An overview. Journal of Pure and Applied Microbiology, 12(3), pp.1655-1659. [CrossRef] [Google Scholar]
- Singh, H., Singh, J.I.P., Singh, S., Dhawan, V. and Tiwari, S.K., 2018. A brief review of jute fibre and its composites. Materials Today: Proceedings, 5(14), pp.28427-28437. [CrossRef] [Google Scholar]
- Akhtar, N. and Bansal, J.G., 2017. Risk factors of Lung Cancer in nonsmoker. Current problems in cancer, 41(5), pp.328-339. [CrossRef] [PubMed] [Google Scholar]
- Mahajan, N., Rawal, S., Verma, M., Poddar, M. and Alok, S., 2013. A phytopharmacological overview on Ocimum species with special emphasis on Ocimum sanctum. Biomedicine & Preventive Nutrition, 3(2), pp.185-192. [CrossRef] [Google Scholar]
- Vinnik, D.A., Zhivulin, V.E., Sherstyuk, D.P., Starikov, A.Y., Zezyulina, P.A., Gudkova, S.A., Zherebtsov, D.A., Rozanov, K.N., Trukhanov, S.V., Astapovich, K.A. and Turchenko, V.A., 2021. Electromagnetic properties of zinc–nickel ferrites in the frequency range of 0.05–10 GHz. Materials Today Chemistry, 20, p.100460. [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.