Penetration Testing for Internet of Things Systems: Cyber Threats, Methods and Stages
- 10 August 2022
- journal article
- Published by National Academy of Sciences of Ukraine (Co. LTD Ukrinformnauka) (Publications) in Èlektronnoe modelirovanie
- Vol. 44 (4), 79-104
- https://doi.org/10.15407/emodel.44.04.079
Abstract
No abstract availableThis publication has 35 references indexed in Scilit:
- Internet of Things: Architectures, Protocols, and ApplicationsJournal of Electrical and Computer Engineering, 2017
- A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of ThingsSensors, 2016
- Threats to Networking Cloud and Edge Datacenters in the Internet of ThingsIEEE Cloud Computing, 2016
- Penetration testing: Concepts, attack methods, and defense strategiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Security in Internet of Things: Challenges, Solutions and Future DirectionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Choices for interaction with things on Internet and underlying issuesAd Hoc Networks, 2015
- Internet of Things (IoT): A Literature ReviewJournal of Computer and Communications, 2015
- Node capture attack in Wireless Sensor Network: A surveyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Future Internet: The Internet of Things Architecture, Possible Applications and Key ChallengesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Remote timing attacks are practicalComputer Networks, 2005