[go: up one dir, main page]

Hamid et al., 2019 - Google Patents

Cyber security issues and challenges for smart cities: A survey

Hamid et al., 2019

Document ID
9433120833040349643
Author
Hamid B
Jhanjhi N
Humayun M
Khan A
Alsayat A
Publication year
Publication venue
2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS)

External Links

Snippet

The increasing need and implementation of Information Communication Technologies (ICT) in urban infrastructure have led to greater attention in smart cities. Smart cities make use of ICTs to enhance: the quality of life of citizens by paving the way to improve local economy …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Hamid et al. Cyber security issues and challenges for smart cities: A survey
Ijaz et al. Smart cities: A survey on security concerns
Razzaq et al. Security issues in the Internet of Things (IoT): A comprehensive study
Tuna et al. A survey on information security threats and solutions for Machine to Machine (M2M) communications
Anwar et al. Security issues and attacks in wireless sensor network
Humayun et al. Industry 4.0 and cyber security issues and challenges
Damghani et al. Classification of attacks on IoT
Singh et al. Study of cyber attacks on cyber-physical system
Tariq et al. Security challenges and requirements for smart internet of things applications: A comprehensive analysis
Almuqren Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions
Wisdom et al. Industrial IoT security infrastructures and threats
Almrezeq et al. Design a secure IoT architecture using smart wireless networks
Daud et al. A study of key technologies for IoT and associated security challenges
Saeed et al. Data-driven techniques and security issues in wireless networks
Rahman et al. Security attacks on wireless networks and their detection techniques
Lobanchykova et al. Analysis and protection of IoT systems: Edge computing and decentralized decision-making
Prakash et al. A survey of security challenges, attacks in IoT
Gupta et al. Security challenges in adopting internet of things for smart network
Alahari et al. Performance analysis of denial of service dos and distributed dos attack of application and network layer of iot
Srhir et al. Towards secure smart campus: security requirements, attacks and counter measures
Alotaibi et al. Security risks in internet of things (IoT): a brief survey
Lobanchykova et al. Analysis of attacks on components of IoT systems and cybersecurity technologies.
Zaimy et al. A review of hacking techniques in IoT systems and future trends of hacking on IoT environment
Obaidat Threats and vulnerabilities of wireless sensor networks in smart cities
El-Sofany et al. A novel model for securing mobile-based systems against DDoS attacks in cloud computing environment