[go: up one dir, main page]

Ramasubramanian et al., 2021 - Google Patents

Study of hardware attacks on smart system design lab

Ramasubramanian et al., 2021

Document ID
16550968328479942103
Author
Ramasubramanian N
Kokila J
Publication year
Publication venue
Security of internet of things nodes: challenges, attacks, and countermeasures

External Links

Snippet

This chapter illustrates elaborately the use of technology to design a hardware platform to handle IoT edge-computing requirements to secure against physical attacks, along with countermeasures and case studies. Based on hardware requirements, there are some …
Continue reading at api.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Aqeel et al. A review of security and privacy concerns in the internet of things (IoT)
Jurcut et al. Security considerations for Internet of Things: A survey
Xenofontos et al. Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies
Neshenko et al. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations
Lee et al. A review on honeypot-based botnet detection models for smart factory
Al-Hawawreh et al. Developing a security testbed for industrial internet of things
Rubio et al. Analysis of Intrusion Detection Systems in Industrial Ecosystems.
US20230370490A1 (en) System and method for cyber exploitation path analysis and task plan optimization
Wang et al. A survey on programmable logic controller vulnerabilities, attacks, detections, and forensics
Sarjan et al. Cyber-security of industrial internet of things in electric power systems
Tian et al. Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems
CN109564609A (en) It mitigates and corrects using the detection of the computer attack of advanced computers decision-making platform
Alsabbagh et al. Security of programmable logic controllers and related systems: Today and Tomorrow
Tariq et al. Context-aware autonomous security assertion for industrial IoT
Cosson et al. Sentinel: A robust intrusion detection system for IoT networks using kernel-level system information
Khalid et al. Cybersecurity in Industry 4.0 context: Background, issues, and future directions
Laghari et al. Internet of Things (IoT) applications security trends and challenges
Bou-Harb et al. Cyber threat intelligence for the internet of things
Islam et al. SYSTEMATIC REVIEW OF CYBERSECURITY THREATS IN IOT DEVICES FOCUSING ON RISK VECTORS VULNERABILITIES AND MITIGATION STRATEGIES
Meziane et al. A Study of Modelling IoT Security Systems with Unified Modelling Language (UML)
Liebl et al. Analyzing the attack surface and threats of industrial Internet of Things devices
Gulzar et al. An analytical survey of cyber‐physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions
Bertolotti et al. A twofold model for the analysis of access control policies in industrial networked systems
Salayma Risk and threat mitigation techniques in internet of things (IoT) environments: a survey
Krishnamurthy et al. Multi-modal side channel data driven golden-free detection of software and firmware Trojans