Smart Home System Security
Home Short Bio Research Publications Services Teaching
Protecting Remote Controlling Apps of Smart-Home-Oriented IOT Devices (https://ieeexplore.ieee.org/document/8449505)
Protecting Remote Controlling Apps of Smart-Home-Oriented IOT Devices (https://ieeexplore.ieee.org/document/8449505)
Xenia: Secure and interoperable smart home system with user pattern recognition (https://ieeexplore.ieee.org/document/8325912)
Xenia: Secure and interoperable smart home system with user pattern recognition (https://ieeexplore.ieee.org/document/8325912)
Side channel attacks on smart home systems: A short overview (https://ieeexplore.ieee.org/document/8217429)
Side channel attacks on smart home systems: A short overview (https://ieeexplore.ieee.org/document/8217429)
Performance Analysis of 6LoWPAN and CoAP for Secure Communications in Smart Homes (https://ieeexplore.ieee.org/document/7474202)
Performance Analysis of 6LoWPAN and CoAP for Secure Communications in Smart Homes (https://ieeexplore.ieee.org/document/7474202)
Securing smart home: Technologies, security challenges, and security requirements (https://ieeexplore.ieee.org/document/6997467)
Securing smart home: Technologies, security challenges, and security requirements (https://ieeexplore.ieee.org/document/6997467)
An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities (https://ieeexplore.ieee.org/document/8379734)
An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities (https://ieeexplore.ieee.org/document/8379734)
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures (https://ieeexplore.ieee.org/document/8433167)
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures (https://ieeexplore.ieee.org/document/8433167)
Cyber security of smart homes: Development of a reference architecture for attack surface analysis (https://ieeexplore.ieee.org/document/8379732)
Cyber security of smart homes: Development of a reference architecture for attack surface analysis (https://ieeexplore.ieee.org/document/8379732)
Exploiting known vulnerabilities of a smart thermostat (https://ieeexplore.ieee.org/document/7906936)
Exploiting known vulnerabilities of a smart thermostat (https://ieeexplore.ieee.org/document/7906936)
Privacy leakages in Smart Home wireless technologies (https://ieeexplore.ieee.org/document/6986977)
Privacy leakages in Smart Home wireless technologies (https://ieeexplore.ieee.org/document/6986977)
Categorisation of security threats for smart home appliances (https://ieeexplore.ieee.org/document/8441213)
Categorisation of security threats for smart home appliances (https://ieeexplore.ieee.org/document/8441213)
Improvements to the Smart Energy Profile security (https://ieeexplore.ieee.org/document/7986482)
Improvements to the Smart Energy Profile security (https://ieeexplore.ieee.org/document/7986482)
How an IoT-enabled “smart refrigerator” can play a clandestine role in perpetuating cyber-crime (https://ieeexplore.ieee.org/document/8102362)
How an IoT-enabled “smart refrigerator” can play a clandestine role in perpetuating cyber-crime (https://ieeexplore.ieee.org/document/8102362)
Experimental evaluation of cybersecurity threats to the smart-home (https://ieeexplore.ieee.org/document/8384143)
Experimental evaluation of cybersecurity threats to the smart-home (https://ieeexplore.ieee.org/document/8384143)
Security analysis on consumer and industrial IoT devices (https://ieeexplore.ieee.org/document/7428064)
Security analysis on consumer and industrial IoT devices (https://ieeexplore.ieee.org/document/7428064)
Smart-TV Security Analysis: Practical Experiments (https://ieeexplore.ieee.org/document/7266876)
Smart-TV Security Analysis: Practical Experiments (https://ieeexplore.ieee.org/document/7266876)