Internet of Things (IoT) devices are quickly growing in adoption. The use case for IoT devices runs the gamut from household applications (such as toasters, lighting, and thermostats) to medical, battlefield, or Industrial Control System (ICS) applications that are used in life or death situations. A disturbing trend for IoT devices is that they are not developed with security in mind. This lack of security has led to the creation of massive botnets that are used for nefarious acts. To address these issues, it’s important to have a good understanding of the threat landscape that IoT devices face. A commonly used security control to monitor and gain insight into threats is a honeypot. This research explores the creation of a VMI-based ...
A very significant increase in the spread of malware has resulted in malware analysis. A recent appr...
The emergence of IoT has brought many new device manufacturers to the market providing novel product...
This paper presents a design and development ofa modular honeypot for information and operation tech...
Internet of Things (IoT) devices are quickly growing in adoption. The use case for IoT devices runs ...
The Internet of Things (IoT) is growing at an alarming rate. It is estimated that there will be over...
The Internet of Things (IoT) is the emerging world where arbitrary objects from our everyday lives g...
Honeypots have been implemented in network security for years now, from the simplesystems where they...
The number of Internet of Things devices, small low-powered devices with internet connectivity, is u...
Internet of Things (IoT) devices are gaining popularity in daily life as well as in specific fields ...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified ...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified o...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The In...
The cybersecurity landscape is constantly evolving, meaning threat actors continually find and devel...
A very significant increase in the spread of malware has resulted in malware analysis. A recent appr...
A very significant increase in the spread of malware has resulted in malware analysis. A recent appr...
The emergence of IoT has brought many new device manufacturers to the market providing novel product...
This paper presents a design and development ofa modular honeypot for information and operation tech...
Internet of Things (IoT) devices are quickly growing in adoption. The use case for IoT devices runs ...
The Internet of Things (IoT) is growing at an alarming rate. It is estimated that there will be over...
The Internet of Things (IoT) is the emerging world where arbitrary objects from our everyday lives g...
Honeypots have been implemented in network security for years now, from the simplesystems where they...
The number of Internet of Things devices, small low-powered devices with internet connectivity, is u...
Internet of Things (IoT) devices are gaining popularity in daily life as well as in specific fields ...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified ...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified o...
A significant increase of attacks combined with companies neglecting cybersecurity poses a problem f...
This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The In...
The cybersecurity landscape is constantly evolving, meaning threat actors continually find and devel...
A very significant increase in the spread of malware has resulted in malware analysis. A recent appr...
A very significant increase in the spread of malware has resulted in malware analysis. A recent appr...
The emergence of IoT has brought many new device manufacturers to the market providing novel product...
This paper presents a design and development ofa modular honeypot for information and operation tech...