[go: up one dir, main page]

Anwar et al., 2020 - Google Patents

Modeling security threats for smart cities: A stride-based approach

Anwar et al., 2020

View PDF
Document ID
1453590575266132930
Author
Anwar M
Nazir M
Ansari A
Publication year
Publication venue
Smart Cities—Opportunities and Challenges: Select Proceedings of ICSC 2019

External Links

Snippet

With the rapid advancement in IOT devices and networking technologies in recent years, the concept of smart cities has emerged as an important paradigm. A smart city is a heterogeneous network of ubiquitous sensors, along with intelligent processing and control …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Anwar et al. Modeling security threats for smart cities: A stride-based approach
Ramakrishnan et al. A comprehensive and systematic review of the network virtualization techniques in the IoT
Ge et al. A data‐centric capability‐focused approach for system‐of‐systems architecture modeling and analysis
Aldowah et al. Trust in iot systems: a vision on the current issues, challenges, and recommended solutions
Padmaja et al. Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
Al-Khafaji et al. Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise
Jabangwe et al. SIoT framework: Towards an approach for early identification of security requirements for internet-of-things applications
Rosado et al. Analysis of secure mobile grid systems: a systematic approach
Abidi et al. A comprehensive framework for evaluating web services composition methods
Dong et al. Artificial intelligence driving perception, cognition, decision‐making and deduction in energy systems: State‐of‐the‐art and potential directions
Kalaivaani et al. Adaptive multimode decision tree classification model using effective system analysis in IDS for 5G and IoT security issues
Shaheen et al. IoT security and privacy challenges from the developer perspective
Luhach et al. Artificial intelligence paradigms for smart cyber-physical systems
Singh Artificial intelligence with enhanced prospects by blockchain in the cyber domain
Benaddi et al. A framework to secure cluster-header decision in wireless sensor network using blockchain
Domb et al. Anomaly Detection in IoT: Recent Advances, AI and ML Perspectives and Applications
Schreckling et al. Data-centric security for the IoT
Boltz et al. Modeling and Analyzing Zero Trust Architectures Regarding Performance and Security
Renjith et al. Unveiling the security vulnerabilities in android operating system
Astropekakis et al. A survey of IoT software platforms
Akbari Gurabi et al. Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges
Šikanjić et al. Cybersecurity IoT Architecture: One Proposed Solution for the Security Risks and Threats
Alenezi et al. Context-Sensitive Case-Based Software Security Management System
Kaksonen et al. Transparent security method for automating IoT security assessments
Kamila Advancing cloud database systems and capacity planning with dynamic applications