Cybersecurity issues and challenges in Industry 4.0

R Kour - Applications and Challenges of Maintenance and …, 2020 - igi-global.com
The convergence of information technology (IT) and operational technology (OT) and the
associated paradigm shift toward fourth industrial revolution (aka Industry 4.0) in companies …

[PDF][PDF] DECEPTIVE DECOYS: COMBINING BELIEVABLE USER AND NETWORK ACTIVITIES AND DECEPTIVE NETWORK SETUP IN ENHANCING …

EK Serem, DM Mugo, BK Too - Technology (IJEET), 2021 - academia.edu
Cybersecurity threats are a malicious act that seeks to damage, steal, or gain unauthorized
access to information. In recent years there has been an attempt by cybersecurity specialists …

Protecting Institutions of Higher Learning in Kenya: A Scalable Hybrid Decoy Framework against Cyber Threats

EK Serem - 2021 - 41.89.240.73
Cybersecurity threats are malicious acts that seek to damage, steal, or gain unauthorized
access to information. Higher institutions of learning in Kenya have adopted the use of …

Adapting to Change: Analyzing Dynamic System Variations and Cyber Security in Smart Grids

H Tanaka - Innovative Engineering Sciences Journal, 2024 - innovatesci-publishers.com
This paper encompasses a multifaceted exploration of the intricate interplay between
evolving system dynamics and the imperative of fortifying cyber defenses within smart grid …