Anwar et al., 2020 - Google Patents
Modeling security threats for smart cities: A stride-based approachAnwar et al., 2020
View PDF- Document ID
- 1453590575266132930
- Author
- Anwar M
- Nazir M
- Ansari A
- Publication year
- Publication venue
- Smart Cities—Opportunities and Challenges: Select Proceedings of ICSC 2019
External Links
Snippet
With the rapid advancement in IOT devices and networking technologies in recent years, the concept of smart cities has emerged as an important paradigm. A smart city is a heterogeneous network of ubiquitous sensors, along with intelligent processing and control …
- 238000000034 method 0 abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anwar et al. | Modeling security threats for smart cities: A stride-based approach | |
Ramakrishnan et al. | A comprehensive and systematic review of the network virtualization techniques in the IoT | |
Ge et al. | A data‐centric capability‐focused approach for system‐of‐systems architecture modeling and analysis | |
Aldowah et al. | Trust in iot systems: a vision on the current issues, challenges, and recommended solutions | |
Padmaja et al. | Analytics on real time security attacks in healthcare, retail and banking applications in the cloud | |
Al-Khafaji et al. | Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise | |
Jabangwe et al. | SIoT framework: Towards an approach for early identification of security requirements for internet-of-things applications | |
Rosado et al. | Analysis of secure mobile grid systems: a systematic approach | |
Abidi et al. | A comprehensive framework for evaluating web services composition methods | |
Dong et al. | Artificial intelligence driving perception, cognition, decision‐making and deduction in energy systems: State‐of‐the‐art and potential directions | |
Kalaivaani et al. | Adaptive multimode decision tree classification model using effective system analysis in IDS for 5G and IoT security issues | |
Shaheen et al. | IoT security and privacy challenges from the developer perspective | |
Luhach et al. | Artificial intelligence paradigms for smart cyber-physical systems | |
Singh | Artificial intelligence with enhanced prospects by blockchain in the cyber domain | |
Benaddi et al. | A framework to secure cluster-header decision in wireless sensor network using blockchain | |
Domb et al. | Anomaly Detection in IoT: Recent Advances, AI and ML Perspectives and Applications | |
Schreckling et al. | Data-centric security for the IoT | |
Boltz et al. | Modeling and Analyzing Zero Trust Architectures Regarding Performance and Security | |
Renjith et al. | Unveiling the security vulnerabilities in android operating system | |
Astropekakis et al. | A survey of IoT software platforms | |
Akbari Gurabi et al. | Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges | |
Šikanjić et al. | Cybersecurity IoT Architecture: One Proposed Solution for the Security Risks and Threats | |
Alenezi et al. | Context-Sensitive Case-Based Software Security Management System | |
Kaksonen et al. | Transparent security method for automating IoT security assessments | |
Kamila | Advancing cloud database systems and capacity planning with dynamic applications |