Search

Your search keyword '"vulnerabilities"' showing total 16 results

Search Constraints

Start Over You searched for: Descriptor "vulnerabilities" Remove constraint Descriptor: "vulnerabilities" Journal sensors basel switzerland Remove constraint Journal: sensors basel switzerland
16 results on '"vulnerabilities"'

Search Results

1. An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks.

2. Threat Modeling for Communication Security of IoT-Enabled Digital Logistics.

3. Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.

4. Comparative Analysis of Open-Source Tools for Conducting Static Code Analysis.

5. Static-Analysis-Based Solutions to Security Challenges in Cloud-Native Systems: Systematic Mapping Study.

6. Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance.

7. SRE_BBC: A Self-Adaptive Security Enabled Requirements Engineering Approach for SLA Smart Contracts in Blockchain-Based Cloud Systems.

8. Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks.

9. LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review.

10. A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks.

11. Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny.

12. A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead.

13. Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things.

14. Threat Modeling-How to Visualize Attacks on IOTA?

15. Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone.

16. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.

Catalog

Books, media, physical & digital resources