Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications

RV Yohanandhan, RM Elavarasan, P Manoharan… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention
across academia, government, and industry sectors and covers a wide range of applications …

Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

6G: Opening new horizons for integration of comfort, security, and intelligence

G Gui, M Liu, F Tang, N Kato… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
The innovations provided by sixth generation wireless communication (6G) as compared to
fifth generation (5G) are considered in this article based on analysis of related works. With …

Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances

D Zhang, G Feng, Y Shi… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
Multi-agent systems (MASs) are typically composed of multiple smart entities with
independent sensing, communication, computing, and decision-making capabilities …

Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

Machine learning models for secure data analytics: A taxonomy and threat model

R Gupta, S Tanwar, S Tyagi, N Kumar - Computer Communications, 2020 - Elsevier
In recent years, rapid technological advancements in smart devices and their usage in a
wide range of applications exponentially increases the data generated from these devices …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection

HI Kure, S Islam, H Mouratidis - Neural Computing and Applications, 2022 - Springer
Cyber security risk management plays an important role for today's businesses due to the
rapidly changing threat landscape and the existence of evolving sophisticated cyber attacks …

GRU-based deep learning approach for network intrusion alert prediction

MS Ansari, V Bartoš, B Lee - Future Generation Computer Systems, 2022 - Elsevier
The exponential growth in the number of cyber attacks in the recent past has necessitated
active research on network intrusion detection, prediction and mitigation systems. While …