A taxonomy of IoT firmware security and principal firmware analysis techniques
Published in: International Journal of Critical Infrastructure Protection
Sep 01, 2022
Internet of Things (IoT) has come a long way since its inception. However, the standardization process in IoT systems for a secure IoT solution is still in its early days. Numerous quality review articles have been contributed by researchers on existing frameworks, architectures, as well as the threats to IoT on different layers. However, most of the existing work neglects the security aspects of firmware in the IoT ecosystem. As such, there is a lack of comprehensive survey on IoT firmware sec...
Problematic Social Media Use and Academic Performance among University Students: An Evaluation from The Middle East
Published in: Open Nursing Journal
Aug 26, 2022
Optimum Design Configuration of Dapped-End Beam Under Dynamic Loading Using TOPSIS Method
Published in: 8th World Congress on Mechanical, Chemical, and Material Engineering
Jul 19, 2022
Novel partial overlapped gaussian pulse multi-access system aided by data analysis
Published in: Computers and Electrical Engineering
Jul 01, 2022
Orthogonal frequency-division multi-access (OFDMA) systems have limited flexibility to improve efficiency due to their dependency on subcarrier orthogonality. As a result of this restriction, attention has shifted to a new multi-access communication method. The popularity of non-orthogonal multi-access (NOMA) systems is growing. Because the NOMA systems may broadcast and receive signals at various power levels, more complicated reception devices are required. Partially overlapped subcarriers or...
COVID-19 Pandemic and the Cyberthreat Landscape: Research Challenges and Opportunities
Published in: Journal
Jun 23, 2022
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic, to identify opportunities that target vulnerable individuals, organizations (e.g., medical facilities), and systems. In this paper, we examine the various cyberthreats associated with the COVID-19 pandemic. We also determine the attack vectors an...