作者
Anand Singh Rajawat, Romil Rawat, Kanishk Barhanpurkar, Rabindra Nath Shaw, Ankush Ghosh
发表日期
2021
期刊
Computationally intelligent systems and their applications
页码范围
39-51
出版商
Springer Singapore
简介
Due to the potentially catastrophic effects in the event of an attack, security-enabled design and algorithms are required to protect automated applications and instruments based on Internet Industries of Thing called as IIoT. The most potential developed techniques for analyzing, designing, and protecting the Internet of Things (IoT) technologies are computational intelligence and big data analysis. These strategies will also help to enhance the protection of IIoT networks (home automation, traffic lighting, power stations, oil and gas stations, smart warehouses, automated vehicles, smart robotics). First, we present the popular IIoT computational intelligence (CIA) algorithm and its related vulnerabilities in this article. We then conduct a cyber-threat-vulnerability review by investigating the use of CIA model to combat illicit behaviors of dark Web environment. The proposed work is based on the literature data …
引用总数
学术搜索中的文章