2021
DOI: 10.1007/978-3-030-88524-3
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Risk of IoT on Smart Cities

Abstract: translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
25
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(25 citation statements)
references
References 0 publications
0
25
0
Order By: Relevance
“…For instance, Chehida et al [47] and Nakamura et al [64] propose that the impact of attacks on assets and users should be considered in threat analysis. In contrast, Andrade et al [44] highlight the importance of considering user interactions with real-world physical devices. By adopting these approaches, researchers can develop a more nuanced understanding of the complex relationship between assets, users, and threats in the context of IoT security.…”
Section: Identification Of Usersmentioning
confidence: 97%
See 4 more Smart Citations
“…For instance, Chehida et al [47] and Nakamura et al [64] propose that the impact of attacks on assets and users should be considered in threat analysis. In contrast, Andrade et al [44] highlight the importance of considering user interactions with real-world physical devices. By adopting these approaches, researchers can develop a more nuanced understanding of the complex relationship between assets, users, and threats in the context of IoT security.…”
Section: Identification Of Usersmentioning
confidence: 97%
“…The use of a neural network allows the authors to easily decide the types of assets used, tailored to be smart city specific. Alternatively, Andrade et al [44] focus on critical assets, rather than trying to identify them all. These assets may have a much higher priority due to a higher damage potential, which may propagate within a smart city network.…”
Section: Identification Of Iot Assetsmentioning
confidence: 99%
See 3 more Smart Citations