Biblio

Filters: Author is Kumar, G. Anil  [Clear All Filters]
2023-01-13
Y, Justindhas., Kumar, G. Anil, Chandrashekhar, A, Raman, R Raghu, Kumar, A. Ravi, S, Ashwini.  2022.  Internet of Things based Data Security Management using Three Level Cyber Security Policies. 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). :1–8.
The Internet of Things devices is rapidly becoming widespread, as are IoT services. Their achievement has not gone unnoticed, as threats as well as attacks towards IoT devices as well as services continue to grow. Cyber attacks are not unique to IoT, however as IoT becomes more ingrained in our lives as well as communities, it is imperative to step up as well as take cyber defense seriously. As a result, there is a genuine need to protect IoT, which necessitates a thorough understanding of the dangers and attacks against IoT infrastructure. The purpose of this study is to define threat types, as well as to assess and characterize intrusions and assaults against IoT devices as well as services