Article

A taxonomy of IoT firmware security and principal firmware analysis techniques

Published in: International Journal of Critical Infrastructure Protection

Sep 01, 2022

Ibrahim Nadir / Haroon Mahmood Ghalib Asadullah

Internet of Things (IoT) has come a long way since its inception. However, the standardization process in IoT systems for a secure IoT solution is still in its early days. Numerous quality review articles have been contributed by researchers on existing frameworks, architectures, as well as the threats to IoT on different layers. However, most of the existing work neglects the security aspects of firmware in the IoT ecosystem. As such, there is a lack of comprehensive survey on IoT firmware sec...


Article

Novel partial overlapped gaussian pulse multi-access system aided by data analysis

Published in: Computers and Electrical Engineering

Jul 01, 2022

Salam Alyassri Muhammad Ilyas Ali Marhoon Oguz Bayat

Orthogonal frequency-division multi-access (OFDMA) systems have limited flexibility to improve efficiency due to their dependency on subcarrier orthogonality. As a result of this restriction, attention has shifted to a new multi-access communication method. The popularity of non-orthogonal multi-access (NOMA) systems is growing. Because the NOMA systems may broadcast and receive signals at various power levels, more complicated reception devices are required. Partially overlapped subcarriers or...


Article

COVID-19 Pandemic and the Cyberthreat Landscape: Research Challenges and Opportunities

Published in: Journal

Jun 23, 2022

/ Heba Saleous Muhusina Ismail Saleh AlDaajeh Nisha Madathil Saed AlRabaee Kim-Kwang Raymond Choo Nabeel Al-Qirim

Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic, to identify opportunities that target vulnerable individuals, organizations (e.g., medical facilities), and systems. In this paper, we examine the various cyberthreats associated with the COVID-19 pandemic. We also determine the attack vectors an...

Displaying 271-275 of 278 result(s).