Page 238 - Kaleidoscope Academic Conference Proceedings 2024
P. 238

2024 ITU Kaleidoscope Academic Conference




            [8] Ukraine war spotlights agriculture sector’s vulnerability  [20] National Vulnerability Database (NVD), https://nvd.
               to cyber attack,  https://blog.talosintelligence.com/  nist.gov/, Accessed on May 9, 2024.
               ukraine-and-fragility-of-agriculture/, Accessed on May
                                                              [21] The IoT Cybersecurity Improvement Act, https://www.
               9, 2024.
                                                                  congress.gov/bill/116th-congress/house-bill/1668,
            [9] IoT Security:  Protecting Food and Agriculture    Accessed on May 9, 2024.
               Organizations,    https://securityintelligence.com/
                                                              [22] SB-327 Information privacy:  connected devices.,
               articles/iot-security-food-agriculture/,  Accessed on
                                                                  https://leginfo.legislature.ca.gov/faces/billTextClient.
               May 9, 2024.
                                                                  xhtml?bill_id=201720180SB327, Accessed on May 9,
           [10] Hacking Farm to Table:    Uncovering Threats      2024.
               to  Agriculture,  https://www.crowdstrike.com/blog/
                                                              [23] Cybersecurity Act, https://digital-strategy.ec.europa.
               how-threat-hunting-uncovered-attacks-in-the-
                                                                  eu/en/policies/cybersecurity-act, Accessed on May 9,
               agriculture-industry/, Accessed on May 9, 2024.
                                                                  2024.
           [11] Shodan.  "Shodan:   The   search  engine  for
                                                              [24] EU Cyber Resilience Act, https://digital-strategy.ec.
               internet-connected devices.", https://www.shodan.io/,
                                                                  europa.eu/en/library/cyber-resilience-act, Accessed on
               Accessed on May 9, 2024.
                                                                  May 9, 2024.
           [12] Yaser  Jararweh,  Sana  Fatima,  Moath  Jarrah,  [25] Product  Security  and  Telecommunications
               Shadi AlZu’bi, “Smart and sustainable agriculture:  Infrastructure  Act  2022,  https://www.legislation.
               Fundamentals, enabling technologies, and future    gov.uk/ukpga/2022/46/contents/enacted, Accessed on
               directions,” Computers and Electrical Engineering,  May 9, 2024.
               vol. 110 no. 12, 2023.
                                                              [26] ETSI  TS  103  645  V2.1.2  (2020-06),  https:
           [13] Rajasekar. V., Rajkumar. S., “A Study on Internet  //www.etsi.org/deliver/etsi_ts/103600_103699/
               of Things Devices Vulnerabilities using Shodan,”   103645/02.01.02_60/ts_103645v020102p.pdf,
               International Journal of Computing, vol. 2 no. 2,  Accessed on May 9, 2024.
               pp. 149-158, 2023.
                                                              [27] ISO/IEC 27400:2022, https://www.iso.org/standard/
           [14] Mulero-Palencia, Sofía, and Victor Monzon Baeza,  44373.html, Accessed on May 9, 2024.
               “Detection of Vulnerabilities in Smart Buildings Using
                                                              [28] CSA    IoT   Security   Controls  Framework
               the Shodan Tool,”, Electronics 2023, vol. 12 no. 23,
                                                                  v2,        https://cloudsecurityalliance.org/artifacts/
               pp. 4815, 2023.
                                                                  csa-iot-security-controls-framework-v2,  Accessed
           [15] Raghuvanshi,  Abhishek,  Umesh Kumar Singh,       on May 9, 2024.
               Thanwamas Kassanuk,   and Khongdet Phasinam,
                                                              [29] GSMA     IoT    Security   Guidelines   and
               “Internet of Things:  Security vulnerabilities and
                                                                  Assessment,  https://www.gsma.com/iot/iot-security/
               countermeasures,”, ECS Transactions, vol. 107 no. 1,
                                                                  iot-security-guidelines/, Accessed on May 9, 2024.
               pp. 15043-15052, 2022.
                                                              [30] ETSI  EN  303  645  V2.1.1  (2020-06),  https:
           [16] Alsmadi, Izzat, Zyad Dwekat, Ricardo Cantu, and Bilal
                                                                  //www.etsi.org/deliver/etsi_en/303600_303699/
               Al-Ahmad, “Vulnerability assessment of industrial
                                                                  303645/02.01.01_60/en_303645v020101p.pdf,
               systems using Shodan,”, Cluster Computing, vol. 25
                                                                  Accessed on May 9, 2024.
               no. 3, pp. 1563–1573, 2022.
                                                              [31] NISTIR 8259A, https://nvlpubs.nist.gov/nistpubs/ir/
           [17] Tiago M. Fernández-Caramés, P. Rughani, “Teaching
                                                                  2020/NIST.IR.8259A.pdf, Accessed on May 9, 2024.
               and Learning IoT Cybersecurity and Vulnerability
               Assessment with Shodan through Practical Use Cases,”  [32] ENISA Baseline Security Recommendations for
               Sensors 2020, vol. 20 no. 11, pp. 3048, 2020.      IoT,       https://www.enisa.europa.eu/publications/
                                                                  baseline-security-recommendations-for-iot, Accessed
           [18] AGRI   NEXT.   "Products  Directory  (2023)",     on May 9, 2024.
               https://www.jagri-global.jp/tokyo/en-gb/search/
               2023/product.html, Accessed on May 9, 2024.    [33] Securing the Internet of Things for Consumers,
                                                                  https://www.homeaffairs.gov.au/reports-and-pubs/
           [19] D.Inoue, K.Yoshioka, M.Eto, M.Yamagata, E.Nishino,  files/code-of-practice.pdf, Accessed on May 9, 2024.
               J.Takeuchi, K.Ohkouchi, and K.Nakao, “An Incident
               Analysis System NICTER and Its Analysis Engines  [34] Food and Ag-ISAC, https://www.foodandag-isac.org/,
               Based on Data Mining Techniques,”   Advances       Accessed on May 9, 2024.
               in Neuro-Information Processing, Springer Berlin
               Heidelberg, pp. 579-586, 2009.




                                                          – 194 –
   233   234   235   236   237   238   239   240   241   242   243