Formalising the Impact of Security Attacks on IoT Safety.
Ehsan PoorhadiElena TroubitysnaGyörgy DánPublished in: SAFECOMP Workshops (2020)
Keyphrases
- security problems
- security mechanisms
- security threats
- security issues
- cyber attacks
- security vulnerabilities
- computer security
- key management
- security requirements
- computer networks
- java card
- security protocols
- countermeasures
- information security
- security measures
- data security
- denial of service attacks
- malicious attacks
- stream cipher
- security breaches
- insider attacks
- access control
- cryptographic protocols
- malicious users
- management system
- fault injection
- intrusion detection
- buffer overflow
- security flaws
- cloud computing
- smart card
- cryptographic algorithms
- chosen plaintext
- security management
- security risks
- intrusion detection and prevention
- ddos attacks
- biometric template
- security analysis
- sensitive data
- network security
- big data
- identity theft
- attack detection
- rfid systems
- cyber security
- secret key
- security policies
- location information
- anomaly detection
- data management