Industrial internet of things in intelligent manufacturing: a review, approaches, opportunities, open challenges, and future directions

P Gupta, C Krishna, R Rajesh… - International Journal on …, 2022 - Springer
The industrial internet of things (IIoT) is a buzzword for an industrial framework that paves
the way for intelligent manufacturing. These intelligent technologies are gradually replacing …

Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities

EM Onyema, S Dalal, CAT Romero, B Seth… - Journal of Cloud …, 2022 - Springer
Abstract The Internet of things (IoT) is an important technology that is highly beneficial in
establishing smart items, connections and cities. However, there are worries regarding …

Cyber expert feedback: Experiences, expectations, and opinions about cyber deception

KJ Ferguson-Walter, MM Major, CK Johnson… - Computers & …, 2023 - Elsevier
Human behavior is a critical, yet under-studied topic in cybersecurity. Among the techniques
used for cyber defense, for cyber deception, a better understanding of human perception …

[HTML][HTML] A Comprehensive Survey on Cyber Deception Techniques to Improve Honeypot Performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

[PDF][PDF] Harnessing AI and machine learning for intrusion detection in cyber security

S Chahal - International Journal of Science and Research, 2023 - researchgate.net
The study helps to investigate the performance of ML and AI to detect IDS using different
segments. The first segment helps to inform the project aim, objective, and issues in a …

IoDM: A study on a IoT-based organizational deception modeling with adaptive general-sum game competition

S Seo, D Kim - Electronics, 2022 - mdpi.com
Moving target defense (MTD) and decoy strategies, measures of active defense, were
introduced to secure both the proactive security and reactive adaptability of internet-of-things …

[图书][B] Elements of Deterrence: Strategy, Technology, and Complexity in Global Politics

E Gartzke, JR Lindsay - 2024 - books.google.com
Global politics in the twenty-first century is complicated by dense economic
interdependence, rapid technological innovation, and fierce security competition. How …

Improvement of Linear and Nonlinear Control for PMSM Using Computational Intelligence and Reinforcement Learning

M Nicola, CI Nicola - Mathematics, 2022 - mdpi.com
Starting from the nonlinear operating equations of the permanent magnet synchronous
motor (PMSM) and from the global strategy of the field-oriented control (FOC), this article …

[PDF][PDF] Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs

J Pateria, L Ahuja, S Som, A Seth - Int. J. Inf. Technol. Comput. Sci, 2023 - mecs-press.org
Bluff and truth are major pillars of deception technology. Deception technology majorly relies
on decoygenerated data and looks for any behavior deviation to flag that interaction as an …

AI-Driven Container Security Approaches for 5G and Beyond: A Survey

IT Aktolga, ES Kuru, Y Sever, P Angin - arXiv preprint arXiv:2302.13865, 2023 - arxiv.org
The rising use of microservices based software deployment on the cloud leverages
containerized software extensively. The security of applications running inside containers as …