ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.10695
  4. Cited By
Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security
  Perspective

Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective

21 February 2021
Luis Puche Rondon
Leonardo Babun
Ahmet Aris
Kemal Akkaya
A. S. Uluagac
ArXivPDFHTML

Papers citing "Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective"

31 / 31 papers shown
Title
Information Leakage from Optical Emanations
Information Leakage from Optical Emanations
J. Loughry
D. Umphress
37
186
0
13 Jul 2023
Security and Privacy for Mobile Edge Caching: Challenges and Solutions
Security and Privacy for Mobile Edge Caching: Challenges and Solutions
Jianbing Ni
Kuan Zhang
A. Vasilakos
56
63
0
06 Dec 2020
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart
  Buildings
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings
Luis Puche Rondon
Leonardo Babun
Ahmet Aris
Kemal Akkaya
A. S. Uluagac
38
15
0
12 Oct 2020
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Akm Iqtidar Newaz
Nur Imtiazul Haque
A. Sikder
M. Rahman
A. S. Uluagac
AAML
74
72
0
07 Oct 2020
A Survey on Security and Privacy Issues in Modern Healthcare Systems:
  Attacks and Defenses
A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses
Akm Iqtidar Newaz
A. Sikder
Mohammad Ashiqur Rahman
A. S. Uluagac
70
177
0
15 May 2020
A System-level Behavioral Detection Framework for Compromised CPS
  Devices: Smart-Grid Case
A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case
Leonardo Babun
Hidayet Aksu
A. S. Uluagac
38
36
0
02 Dec 2019
Real-time Analysis of Privacy-(un)aware IoT Applications
Real-time Analysis of Privacy-(un)aware IoT Applications
Leonardo Babun
Z. Berkay Celik
Patrick McDaniel
A. S. Uluagac
58
48
0
24 Nov 2019
Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks
Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks
S. Hristozov
Manuel Huber
G. Sigl
23
9
0
19 Nov 2019
A Context-aware Framework for Detecting Sensor-based Threats on Smart
  Devices
A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices
A. Sikder
Hidayet Aksu
A. S. Uluagac
AAML
45
44
0
22 Oct 2019
Aegis: A Context-aware Security Framework for Smart Home Systems
Aegis: A Context-aware Security Framework for Smart Home Systems
A. Sikder
Leonardo Babun
Hidayet Aksu
Selcuk Uluagac
28
77
0
09 Oct 2019
HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic
  Control Protocol
HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol
Luis Puche Rondon
Leonardo Babun
Kemal Akkaya
Selcuk Uluagac
42
16
0
04 Oct 2019
HealthGuard: A Machine Learning-Based Security Framework for Smart
  Healthcare Systems
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems
Akm Iqtidar Newaz
A. Sikder
M. Rahman
A. S. Uluagac
37
100
0
23 Sep 2019
IoT Supply Chain Security: Overview, Challenges, and the Road Ahead
IoT Supply Chain Security: Overview, Challenges, and the Road Ahead
Muhammad Junaid Farooq
Quanyan Zhu
10
16
0
21 Jul 2019
IoTDots: A Digital Forensics Framework for Smart Environments
IoTDots: A Digital Forensics Framework for Smart Environments
Leonardo Babun
A. Sikder
Abbas Acar
A. S. Uluagac
43
65
0
03 Sep 2018
Light Ears: Information Leakage via Smart Lights
Light Ears: Information Leakage via Smart Lights
Anindya Maiti
Murtuza Jadliwala
AAML
23
14
0
23 Aug 2018
Peek-a-Boo: I see your smart home activities, even encrypted!
Peek-a-Boo: I see your smart home activities, even encrypted!
Abbas Acar
Hossein Fereidooni
Tigist Abera
A. Sikder
Markus Miettinen
Hidayet Aksu
Mauro Conti
A. Sadeghi
Selcuk Uluagac
56
268
0
08 Aug 2018
Detection of Compromised Smart Grid Devices with Machine Learning and
  Convolution Techniques
Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques
Cengiz Kaygusuz
Leonardo Babun
Hidayet Aksu
A. S. Uluagac
37
36
0
13 Apr 2018
WACA: Wearable-Assisted Continuous Authentication
WACA: Wearable-Assisted Continuous Authentication
Abbas Acar
Hidayet Aksu
A. S. Uluagac
Kemal Akkaya
46
36
0
28 Feb 2018
Sensitive Information Tracking in Commodity IoT
Sensitive Information Tracking in Commodity IoT
Berkay Çelik
Leonardo Babun
A. Sikder
Hidayet Aksu
Gang Tan
Patrick McDaniel
A. S. Uluagac
51
221
0
22 Feb 2018
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and
  Applications
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications
A. Sikder
Giuseppe Petracca
Hidayet Aksu
Trent Jaeger
A. S. Uluagac
37
126
0
06 Feb 2018
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote
  Control Signals
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals
Zheng Zhou
Weiming Zhang
Nenghai Yu
47
21
0
10 Jan 2018
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security
  Cameras & Infrared (IR)
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR)
Mordechai Guri
Dima Bykhovsky
Yuval Elovici
37
69
0
18 Sep 2017
DolphinAtack: Inaudible Voice Commands
DolphinAtack: Inaudible Voice Commands
Guoming Zhang
Chen Yan
Xiaoyu Ji
Taimin Zhang
Tianchen Zhang
Wenyuan Xu
AAML
43
694
0
31 Aug 2017
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
A. Sikder
Hidayet Aksu
A. S. Uluagac
AAML
76
122
0
30 Jun 2017
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Abbas Acar
Hidayet Aksu
A. S. Uluagac
Mauro Conti
94
1,077
0
12 Apr 2017
A Survey of Active Attacks on Wireless Sensor Networks and their
  Countermeasures
A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures
Furrakh Shahzad
Maruf Pasha
Arslan Ahmad
AAML
15
30
0
23 Feb 2017
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap
VisiSploit: An Optical Covert-Channel to Leak Data through an Air-Gap
Mordechai Guri
Ofer Hasson
Gabi Kedma
Yuval Elovici
41
76
0
13 Jul 2016
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices
Giuseppe Petracca
Yuqiong Sun
Ahmad Atamli-Reineh
Trent Jaeger
AAML
69
78
0
01 Apr 2016
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
T. Borgohain
U. Kumar
S. Sanyal
49
790
0
09 Jan 2015
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices
Raphael Spreitzer
AAML
61
92
0
15 May 2014
A Survey of Attacks, Security Mechanisms and Challenges in Wireless
  Sensor Networks
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks
G. Padmavathi
D. Shanmugapriya
82
577
0
03 Sep 2009
1