Konferans bildirisi Açık Erişim
Okul, S.; Aydin, M. Ali
<?xml version='1.0' encoding='utf-8'?> <resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd"> <identifier identifierType="URL">https://aperta.ulakbim.gov.tr/record/97933</identifier> <creators> <creator> <creatorName>Okul, S.</creatorName> <givenName>S.</givenName> <familyName>Okul</familyName> <affiliation>TUBITAK BILGEM, Kocaeli, Turkey</affiliation> </creator> <creator> <creatorName>Aydin, M. Ali</creatorName> <givenName>M. Ali</givenName> <familyName>Aydin</familyName> <affiliation>Istanbul Univ, Bilgisayar Muhendisligi Bolumu, Istanbul, Turkey</affiliation> </creator> </creators> <titles> <title>Security Attacks On Iot</title> </titles> <publisher>Aperta</publisher> <publicationYear>2017</publicationYear> <dates> <date dateType="Issued">2017-01-01</date> </dates> <resourceType resourceTypeGeneral="Text">Conference paper</resourceType> <alternateIdentifiers> <alternateIdentifier alternateIdentifierType="url">https://aperta.ulakbim.gov.tr/record/97933</alternateIdentifier> </alternateIdentifiers> <relatedIdentifiers> <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.81043/aperta.97932</relatedIdentifier> <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.81043/aperta.97933</relatedIdentifier> </relatedIdentifiers> <rightsList> <rights rightsURI="http://www.opendefinition.org/licenses/cc-by">Creative Commons Attribution</rights> <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights> </rightsList> <descriptions> <description descriptionType="Abstract">This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stated that there arc three generally accepted layers even though IoT does not have a complete layer structure. These layers are; Object layer, Network layer and Application layer. In addition, the most common security epidemics at IOT are; Botnet, Man in the Middle Attacks, Social Engineering, Data and Identity Defeats and Denial of Service attacks are expressed by examples and analyzes. Finally, these attacks describe how to take precautions in the layers of IOT.</description> </descriptions> </resource>
Görüntülenme | 26 |
İndirme | 12 |
Veri hacmi | 1.5 kB |
Tekil görüntülenme | 19 |
Tekil indirme | 12 |