On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment (original) (raw)

Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD)

Jean Camp

Annual Computer Security Applications Conference

View PDFchevron_right

Defining the behavior of IoT devices through the MUD standard: review, challenges and research directions

Poonam Yadav

IEEE Access, 2021

View PDFchevron_right

Verifying and Monitoring IoTs Network Behavior Using MUD Profiles

dinesha ranathunga

IEEE Transactions on Dependable and Secure Computing, 2020

View PDFchevron_right

SoK: Beyond IoT MUD Deployments - Challenges and Future Directions

Poonam Yadav

ArXiv, 2020

View PDFchevron_right

Extending MUD profiles through an Automated IoT Security Testing Methodology

José Luis Hernández Ramos

IEEE Access

View PDFchevron_right

Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

dinesha ranathunga

ArXiv, 2018

View PDFchevron_right

Combining MUD Policies with SDN for IoT Intrusion Detection

Ayyoob Hamza

Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

View PDFchevron_right

eMUD: Enhanced Manufacturer Usage Description for IoT Botnets Prevention on Home WiFi Routers

Muhammad R A F I Q Mufti

IEEE Access

View PDFchevron_right

Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network

DongInn Kim

2019

View PDFchevron_right

Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems

José Luis Hernández Ramos

Sensors

View PDFchevron_right

NFV-based IoT Security for Home Networks using MUD

Anat Bremler-barr

NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020

View PDFchevron_right

IoT MUD enforcement in the edge cloud using programmable switch

Shubham Lahoti

Proceedings of the ACM SIGCOMM Workshop on Formal Foundations and Security of Programmable Network Infrastructures

View PDFchevron_right

ASTo: A Tool for Security Analysis of IoT Systems

harini akshaya

View PDFchevron_right

Context-aware Automatic Access Policy Specification for IoT Environments

Ashraf Alkhresheh

2018

View PDFchevron_right

CAPE: Continuous Access Policy Enforcement for IoT Deployments

Ashraf Alkhresheh

2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019

View PDFchevron_right

XACML for Building Access Control Policies in Internet of Things

Hany F. Atlam

View PDFchevron_right

A standardized approach to deal with firewall and mobility policies in the IoT

sylvain Kubler Kubler

2014

View PDFchevron_right

Adaptive Access Control Policies for IoT Deployments

Ashraf Alkhresheh

2020 International Wireless Communications and Mobile Computing (IWCMC), 2020

View PDFchevron_right

A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things

nia Upadhyay

View PDFchevron_right

Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements

Ponciano Jorge Escamilla-Ambrosio

2020 IEEE Colombian Conference on Communications and Computing (COLCOM), 2020

View PDFchevron_right

Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches

Wasin Alkishri

Qubahan academic journal, 2024

View PDFchevron_right

THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES

Mahmoud Elkhodr

View PDFchevron_right

A Toolkit for Specifying Service Level Agreements for IoT Applications

Awatif Alqahtani

International Conference on High Performance Computing and Simulation, 2018

View PDFchevron_right

IoTCrawler: Browsing the Internet of Things

Jose Santa

2018 Global Internet of Things Summit (GIoTS), 2018

View PDFchevron_right

INXU - A Security Extension for RFC 8520 to Give Fast Response to New Vulnerabilities on Domestic IoT Networks

Claudio Farias

2020

View PDFchevron_right

An access control management protocol for Internet of Things devices

Denis Reilly

Network Security

View PDFchevron_right

POSTER: Towards Exposing Internet of Things: A Roadmap

Shachar Siboni

Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

View PDFchevron_right

Security Policy Automation-from Specification to Device Configuration

Tom Markham

2008

View PDFchevron_right