391
Views
25
CrossRef citations to date
0
Altmetric
Articles

Security risk management in IoT environment

&

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (10)

Mahdi Pouresmaieli, Mohammad Ataei & Amirhossein Taran. (2023) Future mining based on internet of things (IoT) and sustainability challenges. International Journal of Sustainable Development & World Ecology 30:2, pages 211-228.
Read now
Pushkar Kishore, Gayatri Nayak & Swadhin Kumar Barisal. (2022) Applying unsupervised system-call based software security techniques for anomaly detection. Journal of Information and Optimization Sciences 43:5, pages 915-922.
Read now
Jyotsna & Parma Nand. (2021) Analysis of quality of service metrics and the security concerns in integrated cloud-fog environment for healthcare system. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2481-2499.
Read now
Saurabh Anand, Anant Ram & Manas Kumar Mishra. (2021) Intelligent mobile crowdsensing for secure data integration : A blockchain based approach. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2155-2170.
Read now
Anshita Dhoot, Manisha Manjul, Sonam Kaul Devgan, A. N. Nazarov & Pankaj. (2021) Enhanced lightweight and secure session key establishment protocol for smart home inhabitants. Journal of Discrete Mathematical Sciences and Cryptography 24:5, pages 1327-1335.
Read now
Khushal Singh & Nanhay Singh. (2020) An ensemble hyper-tuned model for IoT sensors attacks and anomaly detection. Journal of Information and Optimization Sciences 41:7, pages 1715-1739.
Read now
Narendra Mishra & R. K. Singh. (2020) DDoS vulnerabilities analysis and mitigation model in cloud computing. Journal of Discrete Mathematical Sciences and Cryptography 23:2, pages 535-545.
Read now
Narendra Mishra & R. K. Singh. (2020) Prioritisation and security defense algorithm for cloud specific vulnerability through scoring and base metric group. Journal of Interdisciplinary Mathematics 23:2, pages 481-491.
Read now
Shaam Garg, Ayush Yadav, Shivam Jamloki, Aanchal Sadana & Kusum Tharani. (2020) IoT based home automation. Journal of Information and Optimization Sciences 41:1, pages 261-271.
Read now
Vishal Kumar, Gayatri Sakya & Chandra Shankar. (2019) WSN and IoT based smart city model using the MQTT protocol. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1423-1434.
Read now

Articles from other publishers (15)

Antonio Santos-Olmo, Luis Enrique Sánchez, David G. Rosado, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis & Eduardo Fernández-Medina. (2023) Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals. Frontiers of Computer Science 18:3.
Crossref
Thiago Poleto, Thyago Celso Cavalcante Nepomuceno, Victor Diogho Heuer de Carvalho, Ligiane Cristina Braga de Oliveira Friaes, Rodrigo Cleiton Paiva de Oliveira & Ciro José Jardim Figueiredo. (2023) Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research. Future Internet 15:12, pages 393.
Crossref
Geetanjali Rathee, Akshay Kumar, S. Karthikeyan & N. Yuvaraj. 2023. Wireless Communication for Cybersecurity. Wireless Communication for Cybersecurity 199 215 .
Amjad Mehmood, Gregory Epiphaniou, Carsten Maple, Nikolaos Ersotelos & Richard Wiseman. (2023) A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites. Sensors 23:21, pages 8720.
Crossref
G. Sangeetha, G. Logeshwari, Archana, L. Lavanya & Sai Harshitha. 2023. Risk Detection and Cyber Security for the Success of Contemporary Computing. Risk Detection and Cyber Security for the Success of Contemporary Computing 75 91 .
David G. Rosado, Antonio Santos-Olmo, Luis Enrique Sánchez, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis & Eduardo Fernández-Medina. (2022) Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Computers in Industry 142, pages 103715.
Crossref
Sondes Ksibi, Faouzi Jaidi & Adel Bouhoula. (2022) A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach. Mobile Networks and Applications.
Crossref
Briget Munyoro, Lemias Zivanai, Ranganai Njodzi & Tendai Shelton Muwani. 2022. Digital Transformation for Promoting Inclusiveness in Marginalized Communities. Digital Transformation for Promoting Inclusiveness in Marginalized Communities 161 184 .
Hassan Karim & Danda B. Rawat. (2022) TollsOnly Please—Homomorphic Encryption for Toll Transponder Privacy in Internet of Vehicles. IEEE Internet of Things Journal 9:4, pages 2627-2636.
Crossref
Cyncia Matsika & Munyaradzi Zhou. (2021) Factors affecting the adoption and use of AVR technology in higher and tertiary education. Technology in Society 67, pages 101694.
Crossref
Janusz Hajda, Ryszard Jakuszewski & Szymon Ogonowski. (2021) Security Challenges in Industry 4.0 PLC Systems. Applied Sciences 11:21, pages 9785.
Crossref
Neelam Naik. (2021) Risk Level Calculation for IoT System. International Journal of Advanced Research in Science, Communication and Technology, pages 103-107.
Crossref
Shadi Shayan, Ki Pyung Kim, Tony Ma & Tan Hai Dang Nguyen. (2020) The First Two Decades of Smart City Research from a Risk Perspective. Sustainability 12:21, pages 9280.
Crossref
In Lee. (2020) Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management. Future Internet 12:9, pages 157.
Crossref
Bin Liao, Yasir Ali, Shah Nazir, Long He & Habib Ullah Khan. (2020) Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review. IEEE Access 8, pages 120331-120350.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.