This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Building Appsec in Enterprises logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Building Appsec in Enterprises logo
  • HOME
  • FEATURED
  • NEWS
  • RESOURCES
  • Back to Security
Home » Penn State Students Create Method to Improve IoT Devices
AppSec News

Penn State Students Create Method to Improve IoT Devices

internet of things
October 11, 2019
KEYWORDS application security / cybersecurity / Internet of Things (IoT)
Reprints
No Comments

Penn State World Campus students pursuing professional studies degrees in information sciences, have developed a multi-pronged data analysis approach that can improve Internet of Things (IoT) devices to protect against cybersecurity threats, according to a Penn State news report. 

"The team applied a combination of approaches often used in traditional network security management to an IoT network simulated by the University of New South Wales Canberra, Australia. Specifically, the team showed how statistical data, machine learning and other data analysis methods could be applied to assure the security of IoT systems across their lifecycle. The researchers then used intrusion detection and a visualization tool, to determine whether or not an attack had already occurred or was in progress within that network," says the report. 

The researchers described their research methods and findings at the 2019 IEEE Ubiquitous Computing, Electronics and Mobile Communication Conference. The researchers received the “Best Paper” award for their work, says the report. 

To read more about the results of the study, click here. 

Subscribe to Security Magazine

Related Articles

Healthcare Industry at Risk Due to IoT Devices and Human Error

Could a Device Labeling System Under the Trump Administration Lead to Better IoT Security?

Related Products

Security Magazine August 2019 Issue

Risk Analysis and the Security Survey, 4th Edition

Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

Related Events

What’s User Experience Got to Do With It?: Creating A Great User Experience To Improve Security

How to Create High-Tech Value in Retail

You must login or register in order to post a comment.

Report Abusive Comment

SCW_FollowOn_360
Tweets by SecCodeWarrior

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing