منابع مشابه
Infrastructure for Securing IoT
The demands on metropolitan wireless networks is likely to change dramatically over the coming years due to the emergence of new applications and devices. The network infrastructure will need to adapt to meet these changing demands. In order to design the future infrastructure, we must first understand these workload trends and the applications that create them. In this white paper, we focus on...
متن کاملThe Cost of Securing IoT Communications
More smart objects and more applications on the Internet of Things (IoT) mean more security challenges. In IoT security is crucial but difficult to obtain. On the one hand the usual trade-off between highly secure and usable systems is more impelling than ever; on the other hand security is considered a feature that has a cost often unaffordable. To relieve this kind of problems, IoT designers ...
متن کاملReassessing Android Malware Analysis: From Apps to IoT System Modelling
Applications based on the Internet of Things (IoT) are increasingly vulnerable to disruption from cyber attacks. Developers and researchers attempt to prevent the growth of such disruption models, mitigate and limit their impact. This requires the understanding and characterization of things and the technologies that empower the IoT. Futhermore, tools to evaluate, analyze and detect security th...
متن کاملProgramming IoT Devices by Demonstration Using Mobile Apps
The revolutionary advances of Internet of Things (IoT) devices and applications have helped IoT emerge as an increasingly important domain for end-user development (EUD). Past research has shown that end users desire to create various customized automations, which would often utilize multiple IoT devices. Many solutions exist to support EUD across multiple IoT devices, but they are limited to d...
متن کاملHow Useful Are Existing Monitoring Languages for Securing Android Apps?
The Android operating system is currently dominating the mobile device market in terms of penetration and growth rate. An important contributor to its success are a wealth of cheap and easy-to-install mobile applications, known as apps. Today, installing untrusted apps is the norm, though this comes with risks: malware is ubiquitous and can easily leak confidential and sensitive data. In this w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Security & Privacy
سال: 2019
ISSN: 1540-7993,1558-4046
DOI: 10.1109/msec.2019.2914190