Konferans bildirisi Açık Erişim

Security Attacks on IoT

Okul, S.; Aydin, M. Ali


MARC21 XML

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2017-01-01</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">TUBITAK BILGEM, Kocaeli, Turkey</subfield>
    <subfield code="a">Okul, S.</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">http://www.opendefinition.org/licenses/cc-by</subfield>
    <subfield code="a">Creative Commons Attribution</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Istanbul Univ, Bilgisayar Muhendisligi Bolumu, Istanbul, Turkey</subfield>
    <subfield code="a">Aydin, M. Ali</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="o">oai:zenodo.org:97933</subfield>
    <subfield code="p">user-tubitak-adresli-yayinlar</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stated that there arc three generally accepted layers even though IoT does not have a complete layer structure. These layers are; Object layer, Network layer and Application layer. In addition, the most common security epidemics at IOT are; Botnet, Man in the Middle Attacks, Social Engineering, Data and Identity Defeats and Denial of Service attacks are expressed by examples and analyzes. Finally, these attacks describe how to take precautions in the layers of IOT.</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.81043/aperta.97933</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <controlfield tag="005">20210316135044.0</controlfield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.81043/aperta.97932</subfield>
    <subfield code="n">doi</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Security Attacks on IoT</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="2">opendefinition.org</subfield>
    <subfield code="a">cc-by</subfield>
  </datafield>
  <controlfield tag="001">97933</controlfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-tubitak-adresli-yayinlar</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="b">conferencepaper</subfield>
    <subfield code="a">publication</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="u">https://aperta.ulakbim.gov.trrecord/97933/files/bib-08f158ef-2f31-4fab-9cb3-1f5a857b8e13.txt</subfield>
    <subfield code="z">md5:1b564119bc7d2680025b15be6ff0be07</subfield>
    <subfield code="s">126</subfield>
  </datafield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="a">2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK)</subfield>
  </datafield>
</record>
65
18
görüntülenme
indirilme
Görüntülenme 65
İndirme 18
Veri hacmi 2.3 kB
Tekil görüntülenme 49
Tekil indirme 18

Alıntı yap