The CISO’s Next Frontier 2021
DOI: 10.1007/978-3-030-75354-2_27
|View full text |Cite
|
Sign up to set email alerts
|

Man-in-the-Middle Attack Prevention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…The complexity of smart IoT allows attackers to turn devices such as T.V.s, watches, CCTV cameras, and even smart pet collars into harmful botnets to be attacked. Thus, the diverse types of threats and vulnerabilities in IoT and networking affect various levels of cybersecurity [13]. Lee surveyed IoT architecture that enables fivelayer corporate IoT architecture and focuses on cybersecurity challenges and solutions at the layer level [14].…”
Section: Related Workmentioning
confidence: 99%
“…The complexity of smart IoT allows attackers to turn devices such as T.V.s, watches, CCTV cameras, and even smart pet collars into harmful botnets to be attacked. Thus, the diverse types of threats and vulnerabilities in IoT and networking affect various levels of cybersecurity [13]. Lee surveyed IoT architecture that enables fivelayer corporate IoT architecture and focuses on cybersecurity challenges and solutions at the layer level [14].…”
Section: Related Workmentioning
confidence: 99%