Open Access
Issue
E3S Web Conf.
Volume 412, 2023
International Conference on Innovation in Modern Applied Science, Environment, Energy and Earth Studies (ICIES’11 2023)
Article Number 01087
Number of page(s) 17
DOI https://doi.org/10.1051/e3sconf/202341201087
Published online 17 August 2023
  1. Atzoria. L, Ieraauthor vitae, g. morabito “the internet of things: A survey, (2010) [Google Scholar]
  2. Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L.: Sequential circuit verification using symbolic model checking. In: 27th ACM/IEEE Design Automation Conference. pp. 46–51. IEEE (1990) [Google Scholar]
  3. Cacciagrano, D.R., Culmone, R.: Formal semantics of an iot-specific language. In 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA). pp. 579–584. IEEE (2018) [Google Scholar]
  4. Caltagirone, S., Pendergast, A., Betz, C.: The diamond model of intrusion analysis. Tech. rep., Center For Cyber Intelligence Analysis and Threat Research Hanover Md (2013) [Google Scholar]
  5. Jacobs, K.: Session details: Book review of K. Jacobs (ed.), Information technology standards and standardization: A global perspective, European Journal of Information Systems (2001) [Google Scholar]
  6. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wireless Networks 20(8), 2481–2501 (2014) [CrossRef] [Google Scholar]
  7. Liaropoulos, A.: 13th european conference on cyber warfare and security eccws-2014 the university of piraeus piraeus, greece (2014) [Google Scholar]
  8. Rodriguez-Mota, A., Escamilla-Ambrosio, P.J., Happa, J., Nurse, J.R.: Towards iot cybersecurity modeling: From malware analysis data to iot system representation. In: 2016 8th IEEE Latin-American Conference on Communications (LATINCOM). pp. 1–6. IEEE (2016) [Google Scholar]
  9. Ruijters, E., Stoelinga, M.: Fault tree analysis: A survey of the stateof-the-art in modeling, analysis and tools. Computer science review 15, 29–62 (2015) [CrossRef] [Google Scholar]
  10. Watson, H.A., et al.: Launch control safety study. Bell labs (1961) [Google Scholar]
  11. Bruce Schneier, Security Analysis of IoT Systems using Attack Trees, (1990) Chahid, Ismail and Abderrahim Marzouk. “A Secure IoT Data Integration in Cloud Storage Systems using ABAC Access Control Policy.” International Journal of Advanced Engineering Research and Science 4 (2017): 34-37. [Google Scholar]
  12. Sjouke Mauw and Martijn Oostdijk. “Foundations of Attack Trees”. In: Information Security and Cryptology ICISC 2005. Ed. by Dong Ho Won and Seungjoo Kim. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 186–198. isbn: 978-3-54033355-5, (2005) [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.