{"title":"基于多元线性回归模型的分层物联网安全威胁感知评估","authors":"Ahmad Bilal, Syed Jahania Shah, Manaal Khan","doi":"10.1109/ICETECC56662.2022.10069660","DOIUrl":null,"url":null,"abstract":"The IoT has enabled us to interconnect millions of devices to create smart networks. However, the consequences of an IoT failure can be severe, hence it becomes extremely critical to study and analyze the security issues. In this study mathematical models are developed using a multiple linear regression approach that helps to gauge the perception of people regarding security threats related to the layered architecture model of IoT. The survey was conducted on students of Habib University. The developed model is based on eleven hypotheses and maps to four critical perception areas of IoT sustainability, trust, exploitation of resources, and threat awareness.","PeriodicalId":364463,"journal":{"name":"2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Assessing Security threats Perception of LayeredInternet of Things using Multiple Linear Regression Model\",\"authors\":\"Ahmad Bilal, Syed Jahania Shah, Manaal Khan\",\"doi\":\"10.1109/ICETECC56662.2022.10069660\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The IoT has enabled us to interconnect millions of devices to create smart networks. However, the consequences of an IoT failure can be severe, hence it becomes extremely critical to study and analyze the security issues. In this study mathematical models are developed using a multiple linear regression approach that helps to gauge the perception of people regarding security threats related to the layered architecture model of IoT. The survey was conducted on students of Habib University. The developed model is based on eleven hypotheses and maps to four critical perception areas of IoT sustainability, trust, exploitation of resources, and threat awareness.\",\"PeriodicalId\":364463,\"journal\":{\"name\":\"2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETECC56662.2022.10069660\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETECC56662.2022.10069660","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Assessing Security threats Perception of LayeredInternet of Things using Multiple Linear Regression Model
The IoT has enabled us to interconnect millions of devices to create smart networks. However, the consequences of an IoT failure can be severe, hence it becomes extremely critical to study and analyze the security issues. In this study mathematical models are developed using a multiple linear regression approach that helps to gauge the perception of people regarding security threats related to the layered architecture model of IoT. The survey was conducted on students of Habib University. The developed model is based on eleven hypotheses and maps to four critical perception areas of IoT sustainability, trust, exploitation of resources, and threat awareness.