[Abstract] Shodan is a search engine for exploring the Internet and thus finding connected devices. Its main use is to provide a tool for cybersecurity researchers and developers to detect vulnerable Internet-connected devices without scanning them directly. Due to its features, Shodan can be used for performing cybersecurity audits on Internet of Things (IoT) systems and devices used in applications that require to be connected to the Internet. The tool allows for detecting IoT device vulnerabilities that are related to two common cybersecurity problems in IoT: the implementation of weak security mechanisms and the lack of a proper security configuration. To tackle these issues, this article describes how Shodan can be used to perform audi...
This paper will describe the security vulnerabilities posed by Internet of Things (IoT) devices, and...
Internet-of-Thing (IoT) is a rapid-emerging technology that exploits the concept of inter-network to...
[EN] The network has exploded in popularity in the twenty-first century in the last few years, becom...
The present study on the vulnerabilities that concern The Internet of Things technology was carried ...
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exp...
In the last decade, we have witnessed an exponential growth in various types of devices (smartphones...
Thesis (Master's)--University of Washington, 2017-06The use of Internet of Things (IoT) devices has ...
Background. With the rise of Internet of Things and Internet connected devices many things become co...
[Abstract] Industry 4.0 and Industrial Internet of Things (IIoT) are paradigms that are driving cur...
In order to carefully evaluate the susceptibility of common IoT devices found in smart homes, this r...
This article describes the developing stands of typical IoT infrastructure Technologies, which are d...
With the rapid proliferation of Internet of things (IoT) devices across various sectors, ensuring ro...
The recent advancements in computing and sensor technologies, coupled with improvements in embedded ...
In this chapter, the problem of detection and prevention systems for Internet of Things attacks is d...
Recent developments in communication and information technologies, especially in the internet of thi...
This paper will describe the security vulnerabilities posed by Internet of Things (IoT) devices, and...
Internet-of-Thing (IoT) is a rapid-emerging technology that exploits the concept of inter-network to...
[EN] The network has exploded in popularity in the twenty-first century in the last few years, becom...
The present study on the vulnerabilities that concern The Internet of Things technology was carried ...
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exp...
In the last decade, we have witnessed an exponential growth in various types of devices (smartphones...
Thesis (Master's)--University of Washington, 2017-06The use of Internet of Things (IoT) devices has ...
Background. With the rise of Internet of Things and Internet connected devices many things become co...
[Abstract] Industry 4.0 and Industrial Internet of Things (IIoT) are paradigms that are driving cur...
In order to carefully evaluate the susceptibility of common IoT devices found in smart homes, this r...
This article describes the developing stands of typical IoT infrastructure Technologies, which are d...
With the rapid proliferation of Internet of things (IoT) devices across various sectors, ensuring ro...
The recent advancements in computing and sensor technologies, coupled with improvements in embedded ...
In this chapter, the problem of detection and prevention systems for Internet of Things attacks is d...
Recent developments in communication and information technologies, especially in the internet of thi...
This paper will describe the security vulnerabilities posed by Internet of Things (IoT) devices, and...
Internet-of-Thing (IoT) is a rapid-emerging technology that exploits the concept of inter-network to...
[EN] The network has exploded in popularity in the twenty-first century in the last few years, becom...