Konferans bildirisi Açık Erişim
Okul, S.; Aydin, M. Ali
{ "conceptdoi": "10.81043/aperta.97932", "conceptrecid": "97932", "created": "2021-03-16T13:50:44.759850+00:00", "doi": "10.81043/aperta.97933", "files": [ { "bucket": "c6832cd2-070e-4500-977a-3453c3a59181", "checksum": "md5:1b564119bc7d2680025b15be6ff0be07", "key": "bib-08f158ef-2f31-4fab-9cb3-1f5a857b8e13.txt", "links": { "self": "https://aperta.ulakbim.gov.tr/api/files/c6832cd2-070e-4500-977a-3453c3a59181/bib-08f158ef-2f31-4fab-9cb3-1f5a857b8e13.txt" }, "size": 126, "type": "txt" } ], "id": 97933, "links": { "badge": "https://aperta.ulakbim.gov.tr/badge/doi/10.81043/aperta.97933.svg", "bucket": "https://aperta.ulakbim.gov.tr/api/files/c6832cd2-070e-4500-977a-3453c3a59181", "conceptbadge": "https://aperta.ulakbim.gov.tr/badge/doi/10.81043/aperta.97932.svg", "conceptdoi": "https://doi.org/10.81043/aperta.97932", "doi": "https://doi.org/10.81043/aperta.97933", "html": "https://aperta.ulakbim.gov.tr/record/97933", "latest": "https://aperta.ulakbim.gov.tr/api/records/97933", "latest_html": "https://aperta.ulakbim.gov.tr/record/97933" }, "metadata": { "access_right": "open", "access_right_category": "success", "communities": [ { "id": "tubitak-adresli-yayinlar" } ], "creators": [ { "affiliation": "TUBITAK BILGEM, Kocaeli, Turkey", "name": "Okul, S." }, { "affiliation": "Istanbul Univ, Bilgisayar Muhendisligi Bolumu, Istanbul, Turkey", "name": "Aydin, M. Ali" } ], "description": "This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stated that there arc three generally accepted layers even though IoT does not have a complete layer structure. These layers are; Object layer, Network layer and Application layer. In addition, the most common security epidemics at IOT are; Botnet, Man in the Middle Attacks, Social Engineering, Data and Identity Defeats and Denial of Service attacks are expressed by examples and analyzes. Finally, these attacks describe how to take precautions in the layers of IOT.", "doi": "10.81043/aperta.97933", "has_grant": false, "license": { "id": "cc-by" }, "meeting": { "title": "2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK)" }, "publication_date": "2017-01-01", "related_identifiers": [ { "identifier": "10.81043/aperta.97932", "relation": "isVersionOf", "scheme": "doi" } ], "relations": { "version": [ { "count": 1, "index": 0, "is_last": true, "last_child": { "pid_type": "recid", "pid_value": "97933" }, "parent": { "pid_type": "recid", "pid_value": "97932" } } ] }, "resource_type": { "subtype": "conferencepaper", "title": "Konferans bildirisi", "type": "publication" }, "title": "Security Attacks on IoT" }, "owners": [ 1 ], "revision": 1, "stats": { "downloads": 12.0, "unique_downloads": 12.0, "unique_views": 19.0, "version_downloads": 12.0, "version_unique_downloads": 12.0, "version_unique_views": 19.0, "version_views": 26.0, "version_volume": 1512.0, "views": 26.0, "volume": 1512.0 }, "updated": "2021-03-16T13:50:44.808864+00:00" }
Görüntülenme | 26 |
İndirme | 12 |
Veri hacmi | 1.5 kB |
Tekil görüntülenme | 19 |
Tekil indirme | 12 |