Modified graph-based algorithm to analyze security threats in IoT

被引:0
|
作者
Arat, Ferhat [1 ]
Akleylek, Sedat [1 ,2 ,3 ,4 ]
机构
[1] Department of Software Engineering, Samsun University, Samsun, Turkey
[2] Department of Computer Engineering, Ondokuz Mayis University Samsun, Samsun, Turkey
[3] University of Tartu, Tartu, Estonia
[4] Cyber Security and Information Technologies Research and Development Centre, Ondokuz Mayis University Samsun, Samsun, Turkey
关键词
27;
D O I
10.7717/PEERJ-CS.1743
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PEERJ, 2023, 11
  • [2] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [3] Graph-Based IoT Microservice Security
    Pahl, Marc-Oliver
    Aubet, Francois-Xavier
    Liebald, Stefan
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [4] Graph-Based Real-Time Security Threats Awareness and Analysis in Enterprise LAN
    Lv, Huiying
    Zhang, Yuan
    Wang, Ruimei
    Wang, Jie
    [J]. LISS 2013, 2015, : 1299 - 1304
  • [5] A Graph-Based Security Framework for Securing Industrial IoT Networks from Vulnerability Exploitations
    George, Gemini
    Thampi, Sabu M.
    [J]. IEEE ACCESS, 2018, 6 : 43586 - 43601
  • [6] Security threats in IoT
    Dorobantu, Octavia Georgiana
    Halunga, Simona
    [J]. 2020 14TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2020, : 155 - 158
  • [7] Research on a Graph-Based Algorithm
    Dai, Shang-ping
    Duan Xin
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, 2008, : 17 - 20
  • [8] Graph-Based Analysis in Network Security
    Collins, M. Patrick
    [J]. 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1333 - 1337
  • [9] A double oracle algorithm for allocating resources on nodes in graph-based security games
    Zhou Yang
    Junwu Zhu
    Ling Teng
    Jiajie Xu
    Zeyu Zhu
    [J]. Multimedia Tools and Applications, 2018, 77 : 10961 - 10977
  • [10] A double oracle algorithm for allocating resources on nodes in graph-based security games
    Yang, Zhou
    Zhu, Junwu
    Teng, Ling
    Xu, Jiajie
    Zhu, Zeyu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10961 - 10977