2021
DOI: 10.1111/exsy.12829
|View full text |Cite
|
Sign up to set email alerts
|

IVQFIoT: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities

Abstract: With time smart services have become more domineering than ever before however, the pertinent security considerations fade to correspond with growing heterogeneity in the internet of things (IoT) devices and new technologies coupled with resource constraints, crafting IoT-based systems more susceptible to cyber-attacks. To ensure a secure IoT environment, pro-active security mechanisms, like scanning vulnerabilities and prioritizing to remediate them timely, should be embedded in the system.Motivated by the fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…To manage vulnerabilities in the cybersecurity scenario, two tools are crucial to classify and track existing vulnerabilities in systems and devices: CVSS (Common Vulnerability Scoring System) [11,12] and CVE (Common Vulnerabilities and Exposures) [13,14]. CVSS is a standardized system that allows to assess the vulnerabilities' severity based on metrics such as impact, exploitation, and attack complexity [15].…”
Section: Ofmentioning
confidence: 99%
“…To manage vulnerabilities in the cybersecurity scenario, two tools are crucial to classify and track existing vulnerabilities in systems and devices: CVSS (Common Vulnerability Scoring System) [11,12] and CVE (Common Vulnerabilities and Exposures) [13,14]. CVSS is a standardized system that allows to assess the vulnerabilities' severity based on metrics such as impact, exploitation, and attack complexity [15].…”
Section: Ofmentioning
confidence: 99%
“…Firstly, in-depth research on the design and implementation of intelligent painting exhibitions can provide new ideas and methods for the innovation and improvement of art exhibitions. Secondly, evaluating and summarizing the effect of intelligent painting exhibitions can provide a reference for managing and operating art exhibitions (Anand et al, 2022). Finally, promoting the successful experiences and practices of intelligent painting exhibitions can promote the integration of art science and technology and the development of cultural and creative industries.…”
Section: Introductionmentioning
confidence: 99%
“…The existing safety and security analysis methods and techniques in the literature have been categorised into informal manual frameworks and MBSE approaches. Some of the notable manual frameworks are the Failure Mode Effect Analysis (FMEA), Fault Trees Analysis (FTA), Dynamic Fault Trees, Petri nets, Attack Trees (AT), Attack-Fault Trees, Attack-Defence Trees, Quantitative Attack Defence Trees, and Bowties, among others [29][30][31][32]. On the other hand, to meet the continuous requirements of systems development, some of the safety-critical domains, such as the automobile [33] and aerospace industries [34], as well as industrial control systems [35], have begun to explore the option of MBSE approaches.…”
Section: Introductionmentioning
confidence: 99%