Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

Bestsellers

Compendium on Electromagnetic Analysis
Compendium on Electromagnetic Analysis

(In 5 Volumes)
Editor-in-chief: Igor Tsukerman
Encyclopedia of Packaging Materials, Processes, and Mechanics
Encyclopedia of Packaging Materials, Processes, and Mechanics

(In 4 Volumes)
Editor-in-chief: Avram Bar-Cohen, Jeffrey C Suhling and Andrew A O Tay
Explosive Ferroelectric Generators
Explosive Ferroelectric Generators

From Physical Principles to Engineering
by Sergey I Shkuratov

 

  • articleNo Access

    IAF: IoT Attack Framework and Unique Taxonomy

    In the early 2000s, the Internet meant being able to connect different communication devices, whereas the focus in the last few years is on connecting “things” to the Internet. Although there is no distinct classification for these devices and things on the Internet, the Internet of Things (IoT) ecosystem primarily consists of a complex network of devices, sensors, and things. These “things” are controlled by humans and utilize the existing cloud infrastructure. These devices provide facilities and benefits to make our lives comfortable. IoT domains include smart homes, healthcare, manufacturing, smart wearables, smart cities, smart grids, industrial IoT, connected vehicles, and smart retail. Different IoT models involve human-to-IoT, IoT-to-IoT, IoT-to-traditional systems architectures. In most scenarios, the architecture ends up connecting to the unsecured Internet. This has thrown open several critical issues leading to cybersecurity attacks on IoT devices. IoT communications, protocols or the architecture were never been conceptualized to handle the new age cybersecurity attacks. IoT devices have limited compute, storage, network, or memory. In this research, the authors present a unique IoT attack framework named IAF focusing on the impact of IoT attacks on IoT applications and service levels. The authors also proposed an all-inclusive attack taxonomy classifying various attacks on IoT ecosystems.

  • chapterNo Access

    Short message service campaign taxonomy for an intelligent marketing system

    This study presents a novel taxonomy of short message service campaigns, for the purpose of building an intelligent marketing system. The main issue of mass marketing is that one size does not fit everybody. In other words, it is challenging to meet different consumer needs. With the help of artificial intelligence, marketers can be supported to overcome some of these challenges. This study uses a mixed methods approach where design science and grounded theory is used to produce a short message service campaign taxonomy for a future intelligent marketing system. Data collection consisted of 386 previously active campaigns used over 33 months to build the taxonomy. An experimental study was conducted to test the effectiveness of the proposed taxonomy. The experiments involved automatic generation of campaign messages. The validity of these campaign messages, and hence the proposed taxonomy, was ascertained by analysing the messages within a business context. The study concludes that the system, intertwined with the taxonomy, performs comparably to a regular campaign. Another proof of concept is that the business context deemed the generated campaign texts to be both semantically and syntactically similar to run them in active campaigns as experiments.