Ramasubramanian et al., 2021 - Google Patents
Study of hardware attacks on smart system design labRamasubramanian et al., 2021
- Document ID
- 16550968328479942103
- Author
- Ramasubramanian N
- Kokila J
- Publication year
- Publication venue
- Security of internet of things nodes: challenges, attacks, and countermeasures
External Links
Snippet
This chapter illustrates elaborately the use of technology to design a hardware platform to handle IoT edge-computing requirements to secure against physical attacks, along with countermeasures and case studies. Based on hardware requirements, there are some …
- 238000004458 analytical method 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Aqeel et al. | A review of security and privacy concerns in the internet of things (IoT) | |
| Jurcut et al. | Security considerations for Internet of Things: A survey | |
| Xenofontos et al. | Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies | |
| Neshenko et al. | Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations | |
| Lee et al. | A review on honeypot-based botnet detection models for smart factory | |
| Al-Hawawreh et al. | Developing a security testbed for industrial internet of things | |
| Rubio et al. | Analysis of Intrusion Detection Systems in Industrial Ecosystems. | |
| US20230370490A1 (en) | System and method for cyber exploitation path analysis and task plan optimization | |
| Wang et al. | A survey on programmable logic controller vulnerabilities, attacks, detections, and forensics | |
| Sarjan et al. | Cyber-security of industrial internet of things in electric power systems | |
| Tian et al. | Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems | |
| CN109564609A (en) | It mitigates and corrects using the detection of the computer attack of advanced computers decision-making platform | |
| Alsabbagh et al. | Security of programmable logic controllers and related systems: Today and Tomorrow | |
| Tariq et al. | Context-aware autonomous security assertion for industrial IoT | |
| Cosson et al. | Sentinel: A robust intrusion detection system for IoT networks using kernel-level system information | |
| Khalid et al. | Cybersecurity in Industry 4.0 context: Background, issues, and future directions | |
| Laghari et al. | Internet of Things (IoT) applications security trends and challenges | |
| Bou-Harb et al. | Cyber threat intelligence for the internet of things | |
| Islam et al. | SYSTEMATIC REVIEW OF CYBERSECURITY THREATS IN IOT DEVICES FOCUSING ON RISK VECTORS VULNERABILITIES AND MITIGATION STRATEGIES | |
| Meziane et al. | A Study of Modelling IoT Security Systems with Unified Modelling Language (UML) | |
| Liebl et al. | Analyzing the attack surface and threats of industrial Internet of Things devices | |
| Gulzar et al. | An analytical survey of cyber‐physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions | |
| Bertolotti et al. | A twofold model for the analysis of access control policies in industrial networked systems | |
| Salayma | Risk and threat mitigation techniques in internet of things (IoT) environments: a survey | |
| Krishnamurthy et al. | Multi-modal side channel data driven golden-free detection of software and firmware Trojans |