Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

IoE Security Threats and You

Publication Type:

Conference Paper

Authors:

Jungwoo Ryoo; Soyoung Kim; Junsung Cho; Hyoungshick Kim; Simon Tjoa; Christopher DeRobertis

Source:

2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA (2017)
  • 4414 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Active calls for articles

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile

  • Downloads
  • Cited in
  • How to cite
No files have yet been downloaded.
Staneva, Elisaveta, and Mariyan Rachev. "Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135-140.
APA style: Ryoo, J., Kim S., Cho J., Kim H., Tjoa S., & DeRobertis C. (2017).  IoE Security Threats and You. 2017 International Conference on Software Security and Assurance (ICSSA).
Chicago style: Ryoo, Jungwoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa, and Christopher DeRobertis. "IoE Security Threats and You." In 2017 International Conference on Software Security and Assurance (ICSSA). Altoona, PA, USA, 2017.
IEEE style: Ryoo, J., S. Kim, J. Cho, H. Kim, S. Tjoa, and C. DeRobertis, "IoE Security Threats and You", 2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA, 2017.
DOI https://doi.org/10.1109/ICSSA.2017.28
  • Trending
  • Latest
  • Most cited
  • The Weaponization of Emerging Technologies and Their Impact on Global Risk: A Perspective from the PfPC Emerging Security Challenges Working Group (1,618)
  • Goodbye Globalization? Hello 'Fragmentegration'! - The World Economy and Strategic Competition (1,221)
  • Hybrid Threats and Strategic Competition (1,202)
  • Towards a New Role for the European Union in the South Caucasus? (1,202)
  • The PfP Consortium Regional Stability in South East Europe Working Group at 25: The Transformed Balkans and the Work Ahead (1,108)
view all
  • Communicating (In)Security in Ukraine
  • Hybrid Warfare in the Black Sea Region: Russian Information-Psychological Operations in Georgia
  • Ukraine's Component in the Platform of European Memory and Conscience
  • Kremlin's 'War on Terrorism' in the Northeastern Caucasus: How Chechnya Still 'Saves' Russia
  • A Theory of Change: 25 Years of the Partnership for Peace Consortium
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2025
This site was designed and is maintained by Procon Ltd., Executive publisher of Connections: The Quarterly Journal