|
Ref. no. | Domain | Description |
|
[85] | IoT | Examined the issues, challenges, and open problems of IoT security |
[86] | IoT | Described vulnerabilities, aims, and goals of security for IoT |
[87] | IoT/mobile computing | Security challenges and issues of mobile computing and IoT |
[88] | IoT/mobile computing | Security study of IoT-based smart phone |
[89] | IoT | Examine identification of IoT application, threats, and impacts |
[90] | IoT/mobile computing | Tool of mobile application for IoT threat analysis |
[91] | IoT | Emphases on requirement-based IoT security analysis |
[92] | IoT | Offered a threat categorization based on dimensions of security |
[93] | IoT | Model of classification for analyzing the relation between possible risk and possible vulnerabilities in devices of home automation |
[94] | IoT | Described the IoT problem analysis and delivered planned way out |
[95] | IoT | Threats and attacks based IoT analysis |
[96] | IoT | Analyzing areas of IoT security |
[97] | Mobile computing | Security study of mobile device to device network through android operating system |
[98] | IoT | Described the layer-based IoT security analysis |
[99] | IoT | Architecture-based analysis in light of security requirements |
[100] | IoT | Study of vulnerability, privacy, and security concerns for IoT |
[101] | IoT | Analysis of associated IoT attack surfaces and vulnerabilities from IoT OWASP framework |
[102] | IoT | Described classification of IoT threat and vulnerabilities |
[103] | IoT | IoT threats and attacks based study |
[104] | IoT | Model of risk evaluation for tackling the issues of security in IoT ecosystem |
[105] | IoT | Analyzing trust-based IoT recommendation approaches in IoT |
|