Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol

Firdous, Syed Naeem, Baig, Zubair, Valli, Craig and Ibrahim, Ahmed 2017, Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol, in Internet of Things-Green Computing-Cyber, Physical and Social Computing-SmartData 2017 : proceedings : 2017 Institute of Electrical and Electronics Engineers International Conference on Internet of Things, Institute of Electrical and Electronics Engineers Green Computing and Communications, Institute of Electrical and Electronics Engineers Cyber, Physical and Social Computing, Institute of Electrical and Electronics Engineers Smart Data : 21-23 June 2017, Exeter, United Kingdom, IEEE, Piscataway, N.J., pp. 748-755, doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115.

Attached Files
Name Description MIMEType Size Downloads

Title Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol
Author(s) Firdous, Syed Naeem
Baig, ZubairORCID iD for Baig, Zubair orcid.org/0000-0002-9245-2703
Valli, Craig
Ibrahim, Ahmed
Conference name Internet of Things, Green Computing and Communications, and Cyber, Physical and Social Computing and Smart Data. IEEE Combined Conference (2017 : 10th : Exeter, England)
Conference location Exeter, England
Conference dates 21-23 Jun. 2017
Title of proceedings Internet of Things-Green Computing-Cyber, Physical and Social Computing-SmartData 2017 : proceedings : 2017 Institute of Electrical and Electronics Engineers International Conference on Internet of Things, Institute of Electrical and Electronics Engineers Green Computing and Communications, Institute of Electrical and Electronics Engineers Cyber, Physical and Social Computing, Institute of Electrical and Electronics Engineers Smart Data : 21-23 June 2017, Exeter, United Kingdom
Editor(s) Wu, Y.
Min, G.
Georgalas, N.
Al Dubi, A.
Jin, X.
Yang, L.
Ma, J.
Yang, P.
Publication date 2017
Start page 748
End page 755
Total pages 8
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) Science & Technology
Technology
Computer Science, Artificial Intelligence
Computer Science, Cybernetics
Computer Science
IoT
Security
MQTT
Threat Modelling
INTERNET
THINGS
ISBN 9781538630662
Language eng
DOI 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115
Indigenous content off
HERDC Research category E1.1 Full written paper - refereed
Persistent URL http://hdl.handle.net/10536/DRO/DU:30137979

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 8 times in TR Web of Science
Scopus Citation Count Cited 14 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 35 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Thu, 04 Jun 2020, 09:24:05 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.