Modified graph-based algorithm to analyze security threats in IoT
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, s...
Main Authors: | Ferhat Arat, Sedat Akleylek |
---|---|
Format: | Article |
Language: | English |
Published: |
PeerJ Inc.
2023-12-01
|
Series: | PeerJ Computer Science |
Subjects: | |
Online Access: | https://peerj.com/articles/cs-1743.pdf |
Similar Items
-
IoT: Communication protocols and security threats
by: Apostolos Gerodimos, et al.
Published: (2023-01-01) -
Survey on Security Threats in Agricultural IoT and Smart Farming
by: Konstantinos Demestichas, et al.
Published: (2020-11-01) -
Blended threat prediction based on knowledge graph embedding in the IoBE
by: Minkyung Lee, et al.
Published: (2023-10-01) -
Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications
by: Hadeel Alrubayyi, et al.
Published: (2024-02-01) -
Security in Internet of Things: A Review
by: Naqash Azeem Khan, et al.
Published: (2022-01-01)