Feb. 6, 2024, 5:10 a.m. | Hector Alaiz-MoretonEscuela de Ingenier\'ias, Universidad de Le\'on Jose Aveleira-MataResearch Institute of Applied Sciences in Cybersecurity,

cs.CR updates on arXiv.org arxiv.org

The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems (IDS) are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection …

actuators attacks challenges classification cs.cr cs.lg cybersecurity devices internet internet of things iot large make up mqtt networks procedure protect protocol protocols sensors systems technologies things

Deputy Chief Information Security Officer

@ United States Holocaust Memorial Museum | Washington, DC

Humbly Confident Security Lead

@ YNAB | Remote

Information Technology Specialist II: Information Security Engineer

@ WBCP, Inc. | Pasadena, CA.

Director of the Air Force Cyber Technical Center of Excellence (CyTCoE)

@ Air Force Institute of Technology | Dayton, OH, USA

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

IT-Security Analyst "Managed Cloud" Fokus MS-Sentinel (m/w/d)*

@ GISA GmbH | Halle, DE