<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>yade</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Yalvaç Akademi Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2548-0820</issn>
                                                                                            <publisher>
                    <publisher-name>Isparta Uygulamalı Bilimler Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.57120/yalvac.1437571</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Information Security Management</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgi Güvenliği Yönetimi</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>IOT SECURITY AND SOFTWARE TESTING</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>IOT SECURITY AND SOFTWARE TESTING</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0000-6561-1943</contrib-id>
                                                                <name>
                                    <surname>Çetlenbik</surname>
                                    <given-names>Osman Can</given-names>
                                </name>
                                                                    <aff>ISPARTA UYGULAMALI BİLİMLER ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-5871-1652</contrib-id>
                                                                <name>
                                    <surname>Süzen</surname>
                                    <given-names>Ahmet Ali</given-names>
                                </name>
                                                                    <aff>Isparta Uygulamalı Bilimler Üniversitesi</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-5614-1556</contrib-id>
                                                                <name>
                                    <surname>Duman</surname>
                                    <given-names>Burhan</given-names>
                                </name>
                                                                    <aff>ISPARTA UYGULAMALI BİLİMLER ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20240325">
                    <day>03</day>
                    <month>25</month>
                    <year>2024</year>
                </pub-date>
                                        <volume>9</volume>
                                        <issue>1</issue>
                                        <fpage>26</fpage>
                                        <lpage>32</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20240215">
                        <day>02</day>
                        <month>15</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20240229">
                        <day>02</day>
                        <month>29</month>
                        <year>2024</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2016, Yalvaç Akademi Dergisi</copyright-statement>
                    <copyright-year>2016</copyright-year>
                    <copyright-holder>Yalvaç Akademi Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>The Internet of Things (IoT) symbolizes the era of increased information exchange and interaction between devices through Internet of Things technology. However, this fascinating technology brings with it a number of security challenges. Some of the security issues stem from the nature of IoT devices. IoT devices are often designed to be cheap and uncomplicated. As a result, security tests may be neglected and security vulnerabilities may arise. There are other factors that compromise the security of IoT devices. For example, most IoT devices have standard passwords that have not been changed. Attackers can easily seize devices by manipulating them. There are data leaks from compromised devices.</p></trans-abstract>
                                                                                                                                    <abstract><p>The Internet of Things (IoT) symbolizes the era of increased information exchange and interaction between devices through Internet of Things technology. However, this fascinating technology brings with it a number of security challenges. Some of the security issues stem from the nature of IoT devices. IoT devices are often designed to be cheap and uncomplicated. As a result, security tests may be neglected and security vulnerabilities may arise. There are other factors that compromise the security of IoT devices. For example, most IoT devices have standard passwords that have not been changed. Attackers can easily seize devices by manipulating them. There are data leaks from compromised devices.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Internet of Things</kwd>
                                                    <kwd>  Cybersecurity</kwd>
                                                    <kwd>  Smart Device</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Internet of Things</kwd>
                                                    <kwd>  Cybersecurity</kwd>
                                                    <kwd>  Smart Device</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Gürfidan, R., &amp; Ersoy, M. (2022). A new approach with blockchain based for safe communication in IoT ecosystem. Journal of Data, Information and Management, 4(1), 49-56.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	Kamsin, I. and Zainal, N. (2021). A comprehensive review on smart iot applications.. https://doi.org/10.2991/ahis.k.210913.069</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	Fedullo, T., Morato, A., Peserico, G., Trevisan, L., Tramarin, F., Vitturi, S., &amp; Rovati, L. (2022). An iot measurement system based on lorawan for additive manufacturing. Sensors, 22(15), 5466. https://doi.org/10.3390/s22155466</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	Wang, F. (2023). Mitigating iot privacy-revealing features by time series data transformation. Journal of Cybersecurity and Privacy, 3(2), 209-226. https://doi.org/10.3390/jcp3020012</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	Abomhara, M. and Køien, G. (2014). Security and privacy in the internet of things: current status and open issues.. https://doi.org/10.1109/prisms.2014.6970594</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	HaddadPajouh, H., Dehghantanha, A., Parizi, R., &amp; Aledhari, M. (2021). A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, 14, 100129. https://doi.org/10.1016/j.iot.2019.100129</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	Yadav, G., Paul, K., Allakany, A., &amp; Okamura, K. (2020). Iot-pen: an e2e penetration testing framework for iot. Journal of Information Processing, 28(0), 633-642. https://doi.org/10.2197/ipsjjip.28.633</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Akhilesh, R., Bills, O., Chilamkurti, N., &amp; Chowdhury, M. (2022). Automated penetration testing framework for smart-home-based iot devices. Future Internet, 14(10), 276. https://doi.org/10.3390/fi14100276</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Süren, E., Heiding, F., Olegård, J., &amp; Lagerström, R. (2022). Patriot: practical and agile threat research for iot. International Journal of Information Security, 22(1), 213-233. https://doi.org/10.1007/s10207-022-00633-3</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	Torres, N., Pinto, P., &amp; Lopes, S. (2021). Security vulnerabilities in lpwans—an attack vector analysis for the iot ecosystem. Applied Sciences, 11(7), 3176. https://doi.org/10.3390/app11073176</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Zhang, S., Bai, G., Li, H., Liu, P., Zhang, M., &amp; Li, S. (2021). Multi-source knowledge reasoning for data-driven iot security. Sensors, 21(22), 7579. https://doi.org/10.3390/s21227579</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	Shafiq, M., Tian, Z., Bashir, A., Du, X., &amp; Guizani, M. (2021). Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. Ieee Internet of Things Journal, 8(5), 3242-3254. 
https://doi.org/10.1109/jiot.2020.3002255</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	Malik, B., Khalid, M., Maryam, M., Nauman, M., Yousaf, S., Mehmood, M.,&amp; Saleem, H. (2019). Iot testing-as-a-service: a new dimension of automation. International Journal of Advanced Computer Science and 
Applications, 10(5). https://doi.org/10.14569/ijacsa.2019.0100545</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Echeverria, A., Cevallos, C., Ortiz-Garcés, I., &amp; Andrade, R. (2021). Cybersecurity model based on hardening for secure internet of things implementation. Applied Sciences, 11(7), 3260. https://doi.org/10.3390/app11073260</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	Lowry, P., Dinev, T., &amp; Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. https://doi.org/10.1057/s41303-017-0066-x</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	Celik, Z., Fernandes, E., Pauley, E., Tan, G., &amp; McDaniel, P. (2019). Program analysis of commodity iot applications for security and privacy. Acm Computing Surveys, 52(4), 1-30. https://doi.org/10.1145/3333501</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Abdulmalek, S., Nasir, A., Jabbar, W., Almuhaya, M., Bairagi, A., Khan, M., &amp; Kee, S. (2022). Iot-based healthcare-monitoring system towards improving quality of life: a review. Healthcare, 10(10), 1993. https://doi.org/10.3390/healthcare10101993</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18] Gürfidan, R., Ersoy, M., &amp; Kilim, O. (2022, May). AI-Powered Cyber Attacks Threats and Measures. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 434-444). Cham: Springer International Publishing.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
