2020
DOI: 10.1007/978-3-030-41103-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Security Metrics at Work on the Things in IoT Systems

Abstract: The Internet of Things (IoT) is deeply changing our society. Daily we use smart devices that automatically collect, aggregate and exchange data about our lives. These data are often pivotal when they are used e.g. to train learning algorithms, to control cyber-physical systems, and to guide administrators to take crucial decisions. As a consequence, security attacks on devices can cause severe damages on IoT systems that take care of essential services, such as delivering power, water, transport, and so on. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Other related work use methods and frameworks to evaluate how secure e.g. a system is [12,14,15,35,46,49]. In other words, these solutions focus on evaluating whether a security control has been implemented or not and how much effort it takes (or how much it costs) to do so.…”
Section: Measuring Cyber Security Without Security Costs-relatednessmentioning
confidence: 99%
See 1 more Smart Citation
“…Other related work use methods and frameworks to evaluate how secure e.g. a system is [12,14,15,35,46,49]. In other words, these solutions focus on evaluating whether a security control has been implemented or not and how much effort it takes (or how much it costs) to do so.…”
Section: Measuring Cyber Security Without Security Costs-relatednessmentioning
confidence: 99%
“…[30, 50-52] Measuring how secure a specific system is (level of security). [12,14,15,35,46,49] Measuring the impact of various cyber-crime attacks.…”
Section: Economics Of Information Security Sourcesmentioning
confidence: 99%
“…More generally, by analysing the abstract paths derived from the model it is possible to identify crucial code structures. We refer to [29,30] for more details.…”
Section: Verification Techniquesmentioning
confidence: 99%