2020
DOI: 10.1007/s13369-019-04319-2
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
94
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 197 publications
(98 citation statements)
references
References 37 publications
1
94
0
3
Order By: Relevance
“…RPL Security Data packets addressing and routing among resource-constrained devices are considered to be an issue because of the necessity of developing integrated protocols for data packets routing across different RPL networks [6]. Data packets routing in IoT constrained devices suffers from potential security threats, and it has a considerable impact since it is related to the user's life [7]. Several RPL attacks occur through the activities of the malicious nodes during the data packets routing among devices [8].…”
Section: 1mentioning
confidence: 99%
See 1 more Smart Citation
“…RPL Security Data packets addressing and routing among resource-constrained devices are considered to be an issue because of the necessity of developing integrated protocols for data packets routing across different RPL networks [6]. Data packets routing in IoT constrained devices suffers from potential security threats, and it has a considerable impact since it is related to the user's life [7]. Several RPL attacks occur through the activities of the malicious nodes during the data packets routing among devices [8].…”
Section: 1mentioning
confidence: 99%
“…Several RPL attacks occur through the activities of the malicious nodes during the data packets routing among devices [8]. This impacts the data security of users since devices are vulnerable to different attacks [7,8]. The RPL security The security of the RPL protocol has been reviewed vastly in [9][10][11].…”
Section: 1mentioning
confidence: 99%
“…The online video conferencing apps such as Zoom, Microsoft Teams, and Google Meet have witnessed an exponential increase in new users signing up daily [7]. However, the use of technology is bringing more issues and threats in terms of cybersecurity [8]. Organizations will have to deal with the growing security demands emerging from the increased risk of cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Where this extensive interconnection has provided convenience to users, it has also increased vulnerability to cybersecurity issues. Researchers are focusing on this domain to provide solutions against the threats posed by attackers [1]. Common targets of cyber attacks are organizational information systems, networks and infrastructures or personal devices and networks.…”
Section: Introductionmentioning
confidence: 99%