Table 1 - uploaded by Zlatogor Minchev
Content may be subject to copyright.
Devices and services in smart homes.

Devices and services in smart homes.

Source publication
Conference Paper
Full-text available
The paper outlines a modelling approach for assessing future cyberthreats, resulting from implementation of multiple IoT devices in future smart home environment. A combination of experts' beliefs, users' questionnaire based surveys results and literature data for multiple smart homes inhabitants' necessities and potential cyber threats hackers' ac...

Contexts in source publication

Context 1
... smart homes' products could be generalized in three categories, aggregated in Table 1: -Sensors and smart devices of limited digital capacity; -Higher capacity devices; -Fully intelligent digital devices and services, processing data and information. ...
Context 2
... study is partially supported by 'Creation of platforms for application studies in 5 TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGY AND STATISTICS IN ECONOMY AND EDUCATION (ICAICTSEE -2015), NOVEMBER 13-14 TH , 2015, UNWE, SOFIA, BULGARIA ...

Similar publications

Article
Full-text available
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better q...

Citations

... The organization of this stage is based on the ideas of Vester's Dynamic System Theory generalization [8], successfully implemented for multiple cyber threats exploration [9], [10]. The modelling is performed, using experts' opinions, literature analysis data and I-SCIP-SA software environment [11]. ...
... A resulting simulation from Matlab R2011b environment, using Beta distribution and cyberattacks probability defined after official statistics and experts' data beliefs [10], [13] with five-years' time horizon is provided in graphical form on Figure 2. According to the presented simulation results, 'IoT Gadgets', 'Cloud Services', 'Network Comms' and smart 'Environment' (see Figure 2) are expected to be most probable (M > 0.5) for future cyberattacks in the new, mixed augmented reality environment. ...
Conference Paper
Full-text available
Digital environment progress towards real and virtual realities mixing is reasonably producing new understandings for ICT progress expectations. In todays' mobile web world, augmented realities are practically integrating 'Internet of Things' (IoT) mobile concept and 3D visualization technologies into a new evolving smart world. This changes our everyday life concepts, adding capabilities with innovative functionalities. However, it also is generating multiple challenges from cybersecurity perspective. This paper studies the problem for human-machine interaction, accentuating on the multifaceted understanding of possible threat sources and attack vectors in the new augmented reality research area. In this context, a system model with prognostic analysis is proposed. The necessity of obtained results validation is finally discussed.
... Another rather flexible validation & verification approach, concerning cyber threats future prognosis is achievable through probabilistic cyber attacks machine simulation [21]. priori' (a) and 'a posteriori' (b) beliefs for cyber threats identification, after [21] A combination of system analysis entities of interest and a suitable probability distribution, implementing expert beliefs for 'a priori' assessment is initially used. ...
... Another rather flexible validation & verification approach, concerning cyber threats future prognosis is achievable through probabilistic cyber attacks machine simulation [21]. priori' (a) and 'a posteriori' (b) beliefs for cyber threats identification, after [21] A combination of system analysis entities of interest and a suitable probability distribution, implementing expert beliefs for 'a priori' assessment is initially used. These are further validated through agent-based cyber attacks probabilistic closed loop simulation (see Figure 8). ...
Conference Paper
Full-text available
Modern web technologies have already become an indispensable part of our everyday life, shaping a new, overlaid tech-social reality. This however generates numerous cyber opportunities & threats, produced as a result of the evolving human-machine and machine-to-machine interactions. The paper outlines a comprehensive, practical solution for meeting these problems from the cybersecurity perspective. A fourfold methodological approach to digital reality cyber threat landscape understanding is presented through: (i) Cyber Threat Landscape Definition, (ii) System Modelling & Analysis, (iii) Hybrid Simulation, (iv) Results Validation & Verification within multiple successful case studies.