Hamid et al., 2019 - Google Patents
Cyber security issues and challenges for smart cities: A surveyHamid et al., 2019
- Document ID
- 9433120833040349643
- Author
- Hamid B
- Jhanjhi N
- Humayun M
- Khan A
- Alsayat A
- Publication year
- Publication venue
- 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS)
External Links
Snippet
The increasing need and implementation of Information Communication Technologies (ICT) in urban infrastructure have led to greater attention in smart cities. Smart cities make use of ICTs to enhance: the quality of life of citizens by paving the way to improve local economy …
- 238000004891 communication 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hamid et al. | Cyber security issues and challenges for smart cities: A survey | |
| Ijaz et al. | Smart cities: A survey on security concerns | |
| Razzaq et al. | Security issues in the Internet of Things (IoT): A comprehensive study | |
| Tuna et al. | A survey on information security threats and solutions for Machine to Machine (M2M) communications | |
| Anwar et al. | Security issues and attacks in wireless sensor network | |
| Humayun et al. | Industry 4.0 and cyber security issues and challenges | |
| Damghani et al. | Classification of attacks on IoT | |
| Singh et al. | Study of cyber attacks on cyber-physical system | |
| Tariq et al. | Security challenges and requirements for smart internet of things applications: A comprehensive analysis | |
| Almuqren | Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions | |
| Wisdom et al. | Industrial IoT security infrastructures and threats | |
| Almrezeq et al. | Design a secure IoT architecture using smart wireless networks | |
| Daud et al. | A study of key technologies for IoT and associated security challenges | |
| Saeed et al. | Data-driven techniques and security issues in wireless networks | |
| Rahman et al. | Security attacks on wireless networks and their detection techniques | |
| Lobanchykova et al. | Analysis and protection of IoT systems: Edge computing and decentralized decision-making | |
| Prakash et al. | A survey of security challenges, attacks in IoT | |
| Gupta et al. | Security challenges in adopting internet of things for smart network | |
| Alahari et al. | Performance analysis of denial of service dos and distributed dos attack of application and network layer of iot | |
| Srhir et al. | Towards secure smart campus: security requirements, attacks and counter measures | |
| Alotaibi et al. | Security risks in internet of things (IoT): a brief survey | |
| Lobanchykova et al. | Analysis of attacks on components of IoT systems and cybersecurity technologies. | |
| Zaimy et al. | A review of hacking techniques in IoT systems and future trends of hacking on IoT environment | |
| Obaidat | Threats and vulnerabilities of wireless sensor networks in smart cities | |
| El-Sofany et al. | A novel model for securing mobile-based systems against DDoS attacks in cloud computing environment |