Uneingeschränkter Zugang

Analysis of Threats for Ambient Assisted Living (AAL) Wireless Sensor Network (WSN)-Based System


Zitieren

[1] S. Baraković, et al.: Quality of Life Framework for Personalised Ageing: A Systematic Review of ICT Solutions, Electronics, 17, 2940, 202010.3390/ijerph17082940721599232344521 Search in Google Scholar

[2] A.L. Bleda, et al.: AmiCare: Ambient Intelligent and Assistive System for Caregivers Support, 16th International Conference on Embedded and Ubiquitous Computing, 201810.1109/EUC.2018.00017 Search in Google Scholar

[3] J. Kulović, S. Baraković, J. Baraković Husić: Analysis of Threats for Web of Things (WoT) System, Bosanskohercegovačka elektrotehnika, 14:19-26, 202010.2478/bhee-2020-0009 Search in Google Scholar

[4] A. Hajrić, T. Smaka, S. Baraković, J. Baraković Husić: Methods, Methodologies, and Tools for Threat Modeling with Case Study, Telfor Journal, 12(1): 56-61, 202010.5937/telfor2001056H Search in Google Scholar

[5] J.D. Meier, A. Mackman, B. Wastell: Threat Modeling Web Applications, Microsoft Corporation, 2005, Available at: https://docs.microsoft.com/en-us/previous-versions/msp-n-p/ff648006(v=pandp.10)?redirectedfrom=MSDN. Search in Google Scholar

[6] A. Shostack: Threat Modeling: Designing for Security, John Wiley & Sons, Inc., 2014 Search in Google Scholar

[7] T. Agarwal: Wireless Sensor Network Architecture and Its Applications, ELPROCUS, 2016, Available at: https://www.elprocus.com/architecture-of-wireless-sensor-network-and-applications/. Search in Google Scholar

[8] L. Banjanović-Mehmedović: Bežične senzorske mreže, University in Tuzla, 2009 Search in Google Scholar

[9] M. Angel, E. Villegas, S. Y. Tang, Y. Qian: Wireless Sensor Network Communication Architecture for Wide-Area Large Scale Soil Moisture Estimation and Wetlands Monitoring, WALSAIP Research Project, Technical Report TR-NCIG-0501 Search in Google Scholar

[10] B. Radenković, et al.: Internet inteligentnih uređaja, University of Belgrade, 2017 Search in Google Scholar

[11] Silicon Laboratories: The Evolution of Wireless Sensor Networks, Report, 2013 Search in Google Scholar

[12] S. Baraković, et al.: Security Issues in Wireless Networks: An Overview, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775732 Search in Google Scholar

[13] J. Fruhlinger: Threat Modeling Explained: A Process for Anticipating Cyber Attacks, 2020. Available at: https://www.csoonline.com/article/3537370/threat-modeling-explained-a-process-for-anticipating-cyber-attacks.html. Search in Google Scholar

[14] Centar informacijske sigurnosti (CIS): Modeliranje sigurnosnih prijetnji (Threat modeling), 2012, Available at: https://www.cis.hr/files/dokumenti/CIS-DOC-2012-05-049.pdf. Search in Google Scholar

[15] Microsoft Corporation: Threat Modeling: Microsoft Threat Modeling Tool, Available at: https://www.microsoft.com/en-us/securityengineering/sdl/threat-modeling. Search in Google Scholar

[16] T. Dervišević, S. Baraković, J. Baraković Husić: Case Study: Security of System for Remote Management of Windows, Bosanskohercegovačka elektrotehnika, 14: 4-11, 202010.2478/bhee-2020-0007 Search in Google Scholar

[17] H. Mahmood: Application Threat Modeling using DREAD and STRIDE, Infosec Blog, 2017, Available at: https://haiderm.com/application-threat-modeling-using-dread-and-stride/. Search in Google Scholar

[18] N. Shevchenko: Threat Modeling: 12 Available Methods, 2018. Available at: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/. Search in Google Scholar

[19] M. Abomhara, G.M. Goein, M. Gerdes: A STRIDE-Based Threat Model for Telehealth Systems, Norsk Informasjonssikkerhetskonferanse (NISK), 2015 Search in Google Scholar

eISSN:
2566-3151
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
2 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, andere, Technik, Elektrotechnik, Grundlagen der Elektrotechnik, Maschinenbau, Mechatronik und Automotive