Open Access
Issue
E3S Web Conf.
Volume 491, 2024
International Conference on Environmental Development Using Computer Science (ICECS’24)
Article Number 04018
Number of page(s) 13
Section Engineering for Environment Development Applications
DOI https://doi.org/10.1051/e3sconf/202449104018
Published online 21 February 2024
  1. V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, ‘‘A survey on IoT security: Application areas, security threats, and solution architectures,’’ IEEE Access, vol. 7, pp. 82721–82743, 2019, doi: 10.1109/ACCESS.2019.2924045. [CrossRef] [Google Scholar]
  2. V. Sharma, I. You, K. Andersson, F. Palmieri, M. H. Rehmani, and J. Lim, ‘‘Security, privacy and trust for smart mobile– Internet of Things (M-IoT): A survey,’’ IEEE Access, vol. 8, pp. 167123–167163, 2019, doi: 10.1109/ACCESS.2020.3022661. [CrossRef] [Google Scholar]
  3. B. Liao, Y. Ali, S. Nazir, L. He, and H. U. Khan, ‘‘Security analysis of IoT devices by using mobile computing: A systematic literature review,’’ IEEE Access, vol. 8, pp. 120331–120350, 2020, doi: 10.1109/ACCESS.2020.3006358. [CrossRef] [Google Scholar]
  4. T. Nandy, M. Y. I. B. Idris, R. Md Noor, L. Mat Kiah, L. S. Lun, N. B. Annuar Juma’at, I. Ahmedy, N. Abdul Ghani, and S. Bhattacharyya, ‘‘Review on security of Internet of Things authentication mechanism,’’ IEEE Access, vol. 7, pp. 151054–151089, 2019, doi: 10.1109/ACCESS.2019.2947723. [CrossRef] [Google Scholar]
  5. L. Chen, S. Thombre, K. Jarvinen, E. S. Lohan, A. Alen-Savikko, H. Leppakoski, M. Z. H. Bhuiyan, S. Bu-Pasha, G. N. Ferrara, S. Honkala, J. Lindqvist, L. Ruotsalainen, P. Korpisaari, and H. Kuusniemi, ‘‘Robustness, security and privacy in location-based services for future IoT: A survey,’’ IEEE Access, vol. 5, pp. 8956–8977, 2017, doi: 10.1109/ACCESS.2017.2695525. [CrossRef] [Google Scholar]
  6. N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, and P. Faruki, ‘‘Network intrusion detection for IoT security based on learning techniques,’’ IEEE Communications. Surveys Tuts., vol. 21, no. 3, pp. 2671–2701, 3rd Quart., 2019, doi: 10.1109/COMST.2019.2896380. [CrossRef] [Google Scholar]
  7. A. Kim, J. Oh, J. Ryu, and K. Lee, ‘‘A review of insider threat detection approaches with IoT perspective,’’ IEEE Access, vol. 8, pp. 78847–78867, 2020, doi: 10.1109/ACCESS.2020.2990195. [CrossRef] [Google Scholar]
  8. F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and A. Zanella, ‘‘IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices,’’ IEEE Internet Things J., vol. 6, no. 5, pp. 8182–8201, Oct. 2019, doi: 10.1109/JIOT.2019.2935189. [CrossRef] [Google Scholar]
  9. R. Roman, J. Zhou, and J. Lopez, ‘‘On the features and challenges of security and privacy in distributed Internet of Things,’’ Computer. Network., vol. 57, no. 10, pp. 2266–2279, Jul. 2013, doi: 10.1016/j.comnet.2012.12.018. [CrossRef] [Google Scholar]
  10. R. Tahir and V. U. OP. Department of Computer Science, ‘‘A study on malware and malware detection techniques,’’ Int. J. Edu. Manage. Eng., vol. 8, no. 2, pp. 20–30, Mar. 2018, doi: 10.5815/ijeme.2018.02.03. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.