Automatic Verification and Execution of Cyber Attack on IoT Devices
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to critical infrastructure, they are used everywhere. This makes them ideal targets for malicious actors to exploit for nefarious purposes. Recent attacks like the Mirai botnet are just examples in which def...
Main Authors: | Fartein Lemjan Færøy, Muhammad Mudassar Yamin, Ankur Shukla, Basel Katt |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-01-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/23/2/733 |
Similar Items
-
Hybrid IoT Cyber Range
by: Karl Edvard Balto, et al.
Published: (2023-03-01) -
A long short-term memory based approach for detecting cyber attacks in IoT using CIC-IoT2023 dataset
by: Akinul Islam Jony, et al.
Published: (2024-01-01) -
An Integral Pedagogical Strategy for Teaching and Learning IoT Cybersecurity
by: Julia Sánchez, et al.
Published: (2020-07-01) -
Detecting IoT Attacks Using an Ensemble Machine Learning Model
by: Vikas Tomer, et al.
Published: (2022-03-01) -
Cybersecurity Risk Analysis in the IoT: A Systematic Review
by: Thanaa Saad AlSalem, et al.
Published: (2023-09-01)