RISK ASSESSMENT IN CYBER ATTACKS BASED ON INTERNET OF THINGS (IOT) Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.55524/csistw.2024.12.1.66
The rapid proliferation of Internet of Things (IoT) devices has ushered in an era of unprecedented connectivity and convenience. However, it has also exposed these devices to a growing number of cyber threats. This study explores the evolving landscape of IoT cyber-attacks and investigates the role of artificial intelligence (AI) in enhancing the security of IoT ecosystems. IoT devices, ranging from smart thermostats and wearables to industrial sensors and autonomous vehicles, have become integral parts of our daily lives and critical infrastructures. With their increasing prevalence, they have become attractive targets for cybercriminals. Traditional security mechanisms often fall short in detecting and mitigating these attacks, making AI a promising solution. This research leverages AI techniques such as machine learning, deep learning, and anomaly detection to analyze patterns and trends in IoT cyber-attacks. By examining a vast dataset of real-world incidents, including botnet-driven DDoS attacks, device compromise, and data breaches, the study identifies common attack vectors and vulnerabilities inherent to IoT devices. Furthermore, it assesses the effectiveness of AI-driven intrusion detection and prevention systems in real-time threat identification.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.55524/csistw.2024.12.1.66
- https://doi.org/10.55524/csistw.2024.12.1.66
- OA Status
- gold
- References
- 30
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4394895051
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4394895051Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.55524/csistw.2024.12.1.66Digital Object Identifier
- Title
-
RISK ASSESSMENT IN CYBER ATTACKS BASED ON INTERNET OF THINGS (IOT)Work title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-03-15Full publication date if available
- Authors
-
Shubham Kumar, Dayashankar SinghList of authors in order
- Landing page
-
https://doi.org/10.55524/csistw.2024.12.1.66Publisher landing page
- PDF URL
-
https://doi.org/10.55524/csistw.2024.12.1.66Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.55524/csistw.2024.12.1.66Direct OA link when available
- Concepts
-
Botnet, Computer security, Computer science, Internet of Things, Intrusion detection system, Denial-of-service attack, Anomaly detection, Wearable computer, Hacker, Cyber-attack, Honeypot, Identification (biology), The Internet, Artificial intelligence, World Wide Web, Embedded system, Biology, BotanyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
30Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4394895051 |
|---|---|
| doi | https://doi.org/10.55524/csistw.2024.12.1.66 |
| ids.doi | https://doi.org/10.55524/csistw.2024.12.1.66 |
| ids.openalex | https://openalex.org/W4394895051 |
| fwci | 0.0 |
| type | article |
| title | RISK ASSESSMENT IN CYBER ATTACKS BASED ON INTERNET OF THINGS (IOT) |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 384 |
| biblio.first_page | 377 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9897000193595886 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11512 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9510999917984009 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Anomaly Detection Techniques and Applications |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9138000011444092 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C22735295 |
| concepts[0].level | 3 |
| concepts[0].score | 0.799526572227478 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q317671 |
| concepts[0].display_name | Botnet |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.7520849704742432 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.731330394744873 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C81860439 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6505218744277954 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[3].display_name | Internet of Things |
| concepts[4].id | https://openalex.org/C35525427 |
| concepts[4].level | 2 |
| concepts[4].score | 0.579136848449707 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[4].display_name | Intrusion detection system |
| concepts[5].id | https://openalex.org/C38822068 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5155037045478821 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[5].display_name | Denial-of-service attack |
| concepts[6].id | https://openalex.org/C739882 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5022063255310059 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3560506 |
| concepts[6].display_name | Anomaly detection |
| concepts[7].id | https://openalex.org/C150594956 |
| concepts[7].level | 2 |
| concepts[7].score | 0.467376172542572 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1334829 |
| concepts[7].display_name | Wearable computer |
| concepts[8].id | https://openalex.org/C86844869 |
| concepts[8].level | 2 |
| concepts[8].score | 0.44479626417160034 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q2798820 |
| concepts[8].display_name | Hacker |
| concepts[9].id | https://openalex.org/C201307755 |
| concepts[9].level | 2 |
| concepts[9].score | 0.44299885630607605 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q4071928 |
| concepts[9].display_name | Cyber-attack |
| concepts[10].id | https://openalex.org/C191267431 |
| concepts[10].level | 2 |
| concepts[10].score | 0.4234945774078369 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q911932 |
| concepts[10].display_name | Honeypot |
| concepts[11].id | https://openalex.org/C116834253 |
| concepts[11].level | 2 |
| concepts[11].score | 0.4202113151550293 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q2039217 |
| concepts[11].display_name | Identification (biology) |
| concepts[12].id | https://openalex.org/C110875604 |
| concepts[12].level | 2 |
| concepts[12].score | 0.38569027185440063 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[12].display_name | The Internet |
| concepts[13].id | https://openalex.org/C154945302 |
| concepts[13].level | 1 |
| concepts[13].score | 0.2560439109802246 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[13].display_name | Artificial intelligence |
| concepts[14].id | https://openalex.org/C136764020 |
| concepts[14].level | 1 |
| concepts[14].score | 0.13788428902626038 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[14].display_name | World Wide Web |
| concepts[15].id | https://openalex.org/C149635348 |
| concepts[15].level | 1 |
| concepts[15].score | 0.1264204978942871 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[15].display_name | Embedded system |
| concepts[16].id | https://openalex.org/C86803240 |
| concepts[16].level | 0 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[16].display_name | Biology |
| concepts[17].id | https://openalex.org/C59822182 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q441 |
| concepts[17].display_name | Botany |
| keywords[0].id | https://openalex.org/keywords/botnet |
| keywords[0].score | 0.799526572227478 |
| keywords[0].display_name | Botnet |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.7520849704742432 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.731330394744873 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/internet-of-things |
| keywords[3].score | 0.6505218744277954 |
| keywords[3].display_name | Internet of Things |
| keywords[4].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[4].score | 0.579136848449707 |
| keywords[4].display_name | Intrusion detection system |
| keywords[5].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[5].score | 0.5155037045478821 |
| keywords[5].display_name | Denial-of-service attack |
| keywords[6].id | https://openalex.org/keywords/anomaly-detection |
| keywords[6].score | 0.5022063255310059 |
| keywords[6].display_name | Anomaly detection |
| keywords[7].id | https://openalex.org/keywords/wearable-computer |
| keywords[7].score | 0.467376172542572 |
| keywords[7].display_name | Wearable computer |
| keywords[8].id | https://openalex.org/keywords/hacker |
| keywords[8].score | 0.44479626417160034 |
| keywords[8].display_name | Hacker |
| keywords[9].id | https://openalex.org/keywords/cyber-attack |
| keywords[9].score | 0.44299885630607605 |
| keywords[9].display_name | Cyber-attack |
| keywords[10].id | https://openalex.org/keywords/honeypot |
| keywords[10].score | 0.4234945774078369 |
| keywords[10].display_name | Honeypot |
| keywords[11].id | https://openalex.org/keywords/identification |
| keywords[11].score | 0.4202113151550293 |
| keywords[11].display_name | Identification (biology) |
| keywords[12].id | https://openalex.org/keywords/the-internet |
| keywords[12].score | 0.38569027185440063 |
| keywords[12].display_name | The Internet |
| keywords[13].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[13].score | 0.2560439109802246 |
| keywords[13].display_name | Artificial intelligence |
| keywords[14].id | https://openalex.org/keywords/world-wide-web |
| keywords[14].score | 0.13788428902626038 |
| keywords[14].display_name | World Wide Web |
| keywords[15].id | https://openalex.org/keywords/embedded-system |
| keywords[15].score | 0.1264204978942871 |
| keywords[15].display_name | Embedded system |
| language | en |
| locations[0].id | doi:10.55524/csistw.2024.12.1.66 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.55524/csistw.2024.12.1.66 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Innovative Research in Computer Science and Technology (IJIRCST) |
| locations[0].landing_page_url | http://doi.org/10.55524/csistw.2024.12.1.66 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5100755125 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1884-8312 |
| authorships[0].author.display_name | Shubham Kumar |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].raw_affiliation_string | College of Engineering and Technology, Lucknow, India |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I2799532815 |
| authorships[0].affiliations[1].raw_affiliation_string | Tech Scholart, Department of Information Technology, Madan Mohan Malviya University of Technology, Gorakhpur, India |
| authorships[0].institutions[0].id | https://openalex.org/I2799532815 |
| authorships[0].institutions[0].ror | https://ror.org/04h1w2j35 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I2799532815 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Madan Mohan Malaviya University of Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Shubham Kumar |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | College of Engineering and Technology, Lucknow, India, Tech Scholart, Department of Information Technology, Madan Mohan Malviya University of Technology, Gorakhpur, India |
| authorships[1].author.id | https://openalex.org/A5032117739 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Dayashankar Singh |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I2799532815 |
| authorships[1].affiliations[0].raw_affiliation_string | Associate Professor, Department of Information Technology, Madan Mohan Malviya University of Technology, Gorakhpur, India |
| authorships[1].institutions[0].id | https://openalex.org/I2799532815 |
| authorships[1].institutions[0].ror | https://ror.org/04h1w2j35 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I2799532815 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Madan Mohan Malaviya University of Technology |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Dayashankar Singh |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Associate Professor, Department of Information Technology, Madan Mohan Malviya University of Technology, Gorakhpur, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.55524/csistw.2024.12.1.66 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | RISK ASSESSMENT IN CYBER ATTACKS BASED ON INTERNET OF THINGS (IOT) |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9897000193595886 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2362574935, https://openalex.org/W1926248, https://openalex.org/W3118687971, https://openalex.org/W2363507101, https://openalex.org/W3159372857, https://openalex.org/W4230824443, https://openalex.org/W4320401378, https://openalex.org/W1517527854, https://openalex.org/W2292210693, https://openalex.org/W776729438 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.55524/csistw.2024.12.1.66 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.55524/csistw.2024.12.1.66 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Innovative Research in Computer Science and Technology (IJIRCST) |
| best_oa_location.landing_page_url | http://doi.org/10.55524/csistw.2024.12.1.66 |
| primary_location.id | doi:10.55524/csistw.2024.12.1.66 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.55524/csistw.2024.12.1.66 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Innovative Research in Computer Science and Technology (IJIRCST) |
| primary_location.landing_page_url | http://doi.org/10.55524/csistw.2024.12.1.66 |
| publication_date | 2024-03-15 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W2949754992, https://openalex.org/W2793643895, https://openalex.org/W1561369259, https://openalex.org/W2971022178, https://openalex.org/W2903023342, https://openalex.org/W2226740399, https://openalex.org/W2486125865, https://openalex.org/W2616603571, https://openalex.org/W2762722865, https://openalex.org/W2131510858, https://openalex.org/W2758001647, https://openalex.org/W2980675863, https://openalex.org/W2943251214, https://openalex.org/W2883867629, https://openalex.org/W2211508709, https://openalex.org/W2770980461, https://openalex.org/W2778334231, https://openalex.org/W2336888468, https://openalex.org/W2802044546, https://openalex.org/W2035124056, https://openalex.org/W2324338818, https://openalex.org/W2619657761, https://openalex.org/W2337259751, https://openalex.org/W6695866934, https://openalex.org/W2528661589, https://openalex.org/W2315510390, https://openalex.org/W2115322091, https://openalex.org/W2751930845, https://openalex.org/W2614235045, https://openalex.org/W2942676612 |
| referenced_works_count | 30 |
| abstract_inverted_index.a | 27, 107, 134 |
| abstract_inverted_index.AI | 106, 113 |
| abstract_inverted_index.By | 132 |
| abstract_inverted_index.an | 12 |
| abstract_inverted_index.as | 116 |
| abstract_inverted_index.in | 11, 50, 99, 129, 173 |
| abstract_inverted_index.it | 20, 162 |
| abstract_inverted_index.of | 3, 5, 14, 30, 39, 46, 54, 75, 137, 166 |
| abstract_inverted_index.to | 26, 65, 124, 158 |
| abstract_inverted_index.IoT | 40, 55, 57, 130, 159 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.and | 17, 42, 63, 68, 79, 101, 121, 127, 146, 155, 170 |
| abstract_inverted_index.era | 13 |
| abstract_inverted_index.for | 91 |
| abstract_inverted_index.has | 9, 21 |
| abstract_inverted_index.our | 76 |
| abstract_inverted_index.the | 36, 44, 52, 149, 164 |
| abstract_inverted_index.(AI) | 49 |
| abstract_inverted_index.DDoS | 142 |
| abstract_inverted_index.This | 33, 110 |
| abstract_inverted_index.With | 82 |
| abstract_inverted_index.also | 22 |
| abstract_inverted_index.data | 147 |
| abstract_inverted_index.deep | 119 |
| abstract_inverted_index.fall | 97 |
| abstract_inverted_index.from | 60 |
| abstract_inverted_index.have | 71, 87 |
| abstract_inverted_index.role | 45 |
| abstract_inverted_index.such | 115 |
| abstract_inverted_index.they | 86 |
| abstract_inverted_index.vast | 135 |
| abstract_inverted_index.(IoT) | 7 |
| abstract_inverted_index.cyber | 31 |
| abstract_inverted_index.daily | 77 |
| abstract_inverted_index.lives | 78 |
| abstract_inverted_index.often | 96 |
| abstract_inverted_index.parts | 74 |
| abstract_inverted_index.rapid | 1 |
| abstract_inverted_index.short | 98 |
| abstract_inverted_index.smart | 61 |
| abstract_inverted_index.study | 34, 150 |
| abstract_inverted_index.their | 83 |
| abstract_inverted_index.these | 24, 103 |
| abstract_inverted_index.Things | 6 |
| abstract_inverted_index.attack | 153 |
| abstract_inverted_index.become | 72, 88 |
| abstract_inverted_index.common | 152 |
| abstract_inverted_index.device | 144 |
| abstract_inverted_index.making | 105 |
| abstract_inverted_index.number | 29 |
| abstract_inverted_index.threat | 175 |
| abstract_inverted_index.trends | 128 |
| abstract_inverted_index.analyze | 125 |
| abstract_inverted_index.anomaly | 122 |
| abstract_inverted_index.dataset | 136 |
| abstract_inverted_index.devices | 8, 25 |
| abstract_inverted_index.exposed | 23 |
| abstract_inverted_index.growing | 28 |
| abstract_inverted_index.machine | 117 |
| abstract_inverted_index.ranging | 59 |
| abstract_inverted_index.sensors | 67 |
| abstract_inverted_index.systems | 172 |
| abstract_inverted_index.targets | 90 |
| abstract_inverted_index.ushered | 10 |
| abstract_inverted_index.vectors | 154 |
| abstract_inverted_index.However, | 19 |
| abstract_inverted_index.Internet | 4 |
| abstract_inverted_index.assesses | 163 |
| abstract_inverted_index.attacks, | 104, 143 |
| abstract_inverted_index.critical | 80 |
| abstract_inverted_index.devices, | 58 |
| abstract_inverted_index.devices. | 160 |
| abstract_inverted_index.evolving | 37 |
| abstract_inverted_index.explores | 35 |
| abstract_inverted_index.inherent | 157 |
| abstract_inverted_index.integral | 73 |
| abstract_inverted_index.patterns | 126 |
| abstract_inverted_index.research | 111 |
| abstract_inverted_index.security | 53, 94 |
| abstract_inverted_index.threats. | 32 |
| abstract_inverted_index.AI-driven | 167 |
| abstract_inverted_index.breaches, | 148 |
| abstract_inverted_index.detecting | 100 |
| abstract_inverted_index.detection | 123, 169 |
| abstract_inverted_index.enhancing | 51 |
| abstract_inverted_index.examining | 133 |
| abstract_inverted_index.including | 140 |
| abstract_inverted_index.intrusion | 168 |
| abstract_inverted_index.landscape | 38 |
| abstract_inverted_index.learning, | 118, 120 |
| abstract_inverted_index.leverages | 112 |
| abstract_inverted_index.promising | 108 |
| abstract_inverted_index.real-time | 174 |
| abstract_inverted_index.solution. | 109 |
| abstract_inverted_index.vehicles, | 70 |
| abstract_inverted_index.wearables | 64 |
| abstract_inverted_index.artificial | 47 |
| abstract_inverted_index.attractive | 89 |
| abstract_inverted_index.autonomous | 69 |
| abstract_inverted_index.identifies | 151 |
| abstract_inverted_index.incidents, | 139 |
| abstract_inverted_index.increasing | 84 |
| abstract_inverted_index.industrial | 66 |
| abstract_inverted_index.mechanisms | 95 |
| abstract_inverted_index.mitigating | 102 |
| abstract_inverted_index.prevention | 171 |
| abstract_inverted_index.real-world | 138 |
| abstract_inverted_index.techniques | 114 |
| abstract_inverted_index.Traditional | 93 |
| abstract_inverted_index.compromise, | 145 |
| abstract_inverted_index.ecosystems. | 56 |
| abstract_inverted_index.prevalence, | 85 |
| abstract_inverted_index.thermostats | 62 |
| abstract_inverted_index.Furthermore, | 161 |
| abstract_inverted_index.connectivity | 16 |
| abstract_inverted_index.convenience. | 18 |
| abstract_inverted_index.intelligence | 48 |
| abstract_inverted_index.investigates | 43 |
| abstract_inverted_index.botnet-driven | 141 |
| abstract_inverted_index.cyber-attacks | 41 |
| abstract_inverted_index.effectiveness | 165 |
| abstract_inverted_index.proliferation | 2 |
| abstract_inverted_index.unprecedented | 15 |
| abstract_inverted_index.cyber-attacks. | 131 |
| abstract_inverted_index.cybercriminals. | 92 |
| abstract_inverted_index.identification. | 176 |
| abstract_inverted_index.vulnerabilities | 156 |
| abstract_inverted_index.infrastructures. | 81 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5100755125 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| corresponding_institution_ids | https://openalex.org/I2799532815 |
| citation_normalized_percentile.value | 0.05497078 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |