2023
DOI: 10.1016/j.iot.2023.100766
|View full text |Cite
|
Sign up to set email alerts
|

Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…As part of the complete assessment of the threat model analysis, it prioritises threats and mitigation based on probabilities, impacts, and countermeasure costs. It evaluates all possible risks throughout the system rather than focusing only on the parts of the system that are expected to exhibit flaws [30].…”
Section: Threat Analysismentioning
confidence: 99%
“…As part of the complete assessment of the threat model analysis, it prioritises threats and mitigation based on probabilities, impacts, and countermeasure costs. It evaluates all possible risks throughout the system rather than focusing only on the parts of the system that are expected to exhibit flaws [30].…”
Section: Threat Analysismentioning
confidence: 99%
“…It not only safeguards against denial-of-service attacks but also contributes to energy conservation and extends the network's lifespan [122]. Several measures must be implemented to maintain the availability of M2M systems in the face of potential security threats and vulnerabilities [123].…”
Section: ) Availabilitymentioning
confidence: 99%
“…We have only included studies (including technical articles and excluding review-type articles) focused on both areas. Table 7 summarizes the methodologies and results of the applications [115][116][117][118][119][120][121][122][123][124][125][126][127].…”
Section: Recent Cps and Iot Applicationsmentioning
confidence: 99%
“…The network traffic load was increased by seven times [116] Attack detection and mitigation using a threat modeling framework…”
Section: Applicationsmentioning
confidence: 99%