Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Batyr Charyyev"'
Autor:
Batyr Charyyev, Mehmet Hadi Gunes
Publikováno v:
IEEE Access, Vol 12, Pp 89467-89478 (2024)
Internet of Things (IoT) devices introduce new vulnerabilities to the network. These devices are relatively cheap, have simple design yet they can collect private user data, and be employed as botnets to conduct large-scale attacks. In general, IoT d
Externí odkaz:
https://doaj.org/article/c38f9ef58af04fcea7eafa67fcfc2562
Autor:
Batyr Charyyev, Mehmet Hadi Gunes
Publikováno v:
IEEE Internet of Things Journal. 8:1272-1281
Engineered systems get smarter with computing capabilities, particularly through a multitude of Internet-of-Things (IoT) devices. IoT devices, however, are prone to be compromised as they are often resource limited and optimized for a certain task. T
Autor:
Engin Arslan, Batyr Charyyev
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 31:1387-1399
End-to-end integrity verification is designed to protect file transfers against silent data corruption by comparing checksum of files at source and destination end points using cryptographic hash functions such as MD5 and SHA1. However, existing impl
Publikováno v:
ISSE
The Internet of Things (IoT) has great potential to transform the healthcare industry. While there are data security and privacy challenges, the adoption of IoT advances healthcare with the integration of instantaneous and continuous data analytics.
Autor:
Mehmet Hadi Gunes, Batyr Charyyev
Publikováno v:
WISEC
The advancement in Internet of Things (IoT) technology has transformed our daily lifestyle. Particularly, voice assistants such as Amazon's Alexa and Google Assistant are commonly deployed in households. These voice assistants enable users to interac
Autor:
Mehmet Hadi Gunes, Batyr Charyyev
Publikováno v:
GLOBECOM
Widespread adoption of Internet of Things (IoT) devices increased the variety of devices connected to a network. These devices have become a primary target of cyber-attacks as they introduce unmanaged vulnerabilities into the network. On the other ha
Publikováno v:
GLOBECOM
Edge computing has become a recent approach to bring computing resources closer to the end-user. While offline processing and aggregate data reside in the cloud, edge computing is promoted for latency-critical and bandwidth-hungry tasks. In this dire
Autor:
Mehmet Hadi Gunes, Batyr Charyyev
Publikováno v:
CPSIOTSEC@CCS
Smart home speakers are deployed in millions of homes around the world. These speakers enable users to interact with other IoT devices in the household and provide voice assistance such as telling the weather and reminding appointments. Although smar
Autor:
Batyr Charyyev, Mehmet Hadi Gunes
Publikováno v:
INFOCOM Workshops
The Internet of Things (IoT) consists of sensors and actuators that facilitate many aspects of our daily life. Compared to typical computing devices such as laptops and smartphones, these devices have a very limited set of functionalities and states.
Autor:
Batyr Charyyev, Mehmet Hadi Gunes
Publikováno v:
ICC
Systems get smarter with computing capabilities, especially in the form of Internet of Things (IoT) devices. IoT devices are often resource-limited as they are optimized for a certain task. Hence, they are prone to be compromised and have become a ta