2020 21st International Arab Conference on Information Technology (ACIT) 2020
DOI: 10.1109/acit50332.2020.9300050
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Cyber Security Measures in Smart Cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…To address the key security challenges, their model first highlights and analyzes these problems along with aspects of risks associated with them, and then provides recommendations for solutions and prevention. A similar approach is suggested by ([ 43 , 44 ], and in particular [ 45 ]), who design a threat ‘hunting’ model based on Sparse Representation based Classifier (SRC). Their framework identifies cyber threats by Opcode, Bytecode, and system call views to provide suggestions on ways of addressing and preventing such threats.…”
Section: Resultsmentioning
confidence: 99%
“…To address the key security challenges, their model first highlights and analyzes these problems along with aspects of risks associated with them, and then provides recommendations for solutions and prevention. A similar approach is suggested by ([ 43 , 44 ], and in particular [ 45 ]), who design a threat ‘hunting’ model based on Sparse Representation based Classifier (SRC). Their framework identifies cyber threats by Opcode, Bytecode, and system call views to provide suggestions on ways of addressing and preventing such threats.…”
Section: Resultsmentioning
confidence: 99%
“…They also discussed the potential of blockchain technology regarding security. Authors in [17] examined the essential cyber security requirements in smart cities based on previous research. Moreover, several other security demands were introduced aiming to fill knowledge gaps.…”
Section: Inclusionmentioning
confidence: 99%
“…[16] Authentication and authorization solutions for IoT, both centralized and decentralized, are reviewed providing information on IoT security.The possibilities of blockchain are discussed. [17] A framework for authentication and authorization in IoT devices is proposed and incorporateds into a standard security framework for IoT devices. A new sender verification mechanism based on time stamps was developed on the device side of the IoT, allowing for token authentication with identity verification capabilities and reducing the need for local identity verification methods at the device side.…”
Section: Inclusionmentioning
confidence: 99%
See 1 more Smart Citation
“…Such damaging activities are typically intended to harm the Information Technology (IT) infrastructure for an organization. On top of that, it can also be intended to harm the IT infrastructure of various governmental and public solutions that have been mainly designed to enhance the individual's way of life [21,23]. Typically, DoS attempts might impact the availability and the accessibility of the targeted internet-based solution due to processing capability overload.…”
Section: Introductionmentioning
confidence: 99%