2022
DOI: 10.1016/j.comcom.2022.01.022
|View full text |Cite
|
Sign up to set email alerts
|

An automated context-aware IoT vulnerability assessment rule-set generator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Scalability can be defined as the ability of a system to preserve quality in the delivery of its services, even if there is an increase in the number of customers [32], and security pivotally relates to protect the system against any type of attack. For instance, the implementation of a system based on Blockchain technology needs to establish implementations that seek to mitigate already identified vulnerabilities, such as those that allow exploitation of the network by Sybil-type attacks [33,34]. where a node maliciously tries to take control of the network by creating other nodes linked to it [35].…”
Section: Healthcare Management System Based On Blockchain Requirementsmentioning
confidence: 99%
“…Scalability can be defined as the ability of a system to preserve quality in the delivery of its services, even if there is an increase in the number of customers [32], and security pivotally relates to protect the system against any type of attack. For instance, the implementation of a system based on Blockchain technology needs to establish implementations that seek to mitigate already identified vulnerabilities, such as those that allow exploitation of the network by Sybil-type attacks [33,34]. where a node maliciously tries to take control of the network by creating other nodes linked to it [35].…”
Section: Healthcare Management System Based On Blockchain Requirementsmentioning
confidence: 99%