Kumar et al., 2017
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
| Kumar et al. | Review on security and privacy concerns in Internet of Things | |
| Hintaw et al. | MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT) | |
| Mallick et al. | Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments | |
| Kumar et al. | EDIMA: Early detection of IoT malware network activity using machine learning techniques | |
| Habibi et al. | Heimdall: Mitigating the internet of insecure things | |
| Cheema et al. | [Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review | |
| Sinha et al. | Information Security threats and attacks with conceivable counteraction | |
| Islam et al. | An analysis of cybersecurity attacks against internet of things and security solutions | |
| Humayun et al. | Industry 4.0 and cyber security issues and challenges | |
| Damghani et al. | Classification of attacks on IoT | |
| Ghadeer | Cybersecurity issues in internet of things and countermeasures | |
| Arukonda et al. | The innocent perpetrators: reflectors and reflection attacks | |
| Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
| Bdair et al. | Brief of intrusion detection systems in detecting ICMPv6 attacks | |
| Dua et al. | Iisr: A secure router for iot networks | |
| Gupta et al. | Security challenges in adopting internet of things for smart network | |
| Khalid et al. | Study of security and privacy issues in internet of things | |
| Zaman et al. | Towards SDN and blockchain based IoT countermeasures: a survey | |
| Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
| Mudgerikar et al. | Iot attacks and malware | |
| Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
| Rani et al. | Classification of security issues and cyber attacks in layered internet of things | |
| da Rocha et al. | A Study on APT in IoT Networks. | |
| Yousef et al. | Four-layer Architecture for IoT Security in Fog Network |