Blockchain-based digital twins: research trends, issues, and future challenges

S Suhail, R Hussain, R Jurdak, A Oracevic… - ACM Computing …, 2022 - dl.acm.org
Industrial processes rely on sensory data for decision-making processes, risk assessment,
and performance evaluation. Extracting actionable insights from the collected data calls for …

[HTML][HTML] Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins

S Suhail, SUR Malik, R Jurdak, R Hussain… - Computers in …, 2022 - Elsevier
The complexity of cyberattacks in Cyber-Physical Systems (CPSs) calls for a mechanism that
can evaluate critical infrastructures' operational behaviour and security without affecting the …

Security attacks and solutions for digital twins

S Suhail, R Jurdak, R Hussain - arXiv preprint arXiv:2202.12501, 2022 - arxiv.org
Digital twins, being the virtual replicas of their physical counterparts, share valuable
knowledge of the underlying system. Therefore, they might become a potential source of …

A Comprehensive Survey of Digital Twins: Applications, Technologies and Security Challenges

SR Jeremiah, A El Azzaoui, NN Xiong… - Journal of Systems …, 2024 - Elsevier
ABSTRACT Alongside advancements in Artificial Intelligence (AI), significant progress has
been made in big data processing, edge/cloud computing, and ubiquitous computing in the …

Analyzing the impact of cyber-attacks on the performance of digital twin-based industrial organizations

R Mustofa, M Rafiquzzaman, NUI Hossain - Journal of Industrial …, 2024 - Elsevier
Digital twin is a virtual copy of their “real-world counterparts”, which refer to physical objects,
systems, or entities that exist in the physical world. They share valuable information about …

A survey on cyber threat intelligence sharing based on Blockchain

A El-Kosairy, N Abdelbaki, H Aslan - Advances in Computational …, 2023 - Springer
In recent years, cyber security attacks have increased massively. This introduces the need to
defend against such attacks. Cyber security threat intelligence has recently been introduced …

Privacy Preserving Based on Seamless Authentication with Provable Key Verification using mIoMT for B5G-enabled Healthcare Systems

BD Deebak, SO Hwang - IEEE Transactions on Services …, 2024 - ieeexplore.ieee.org
B5G-enabled healthcare systems interconnect a wide range of Internet of Medical Things
(IoMT) using supportive networks such as heterogeneous networks and cognitive radio …

Blockchain Powered QA Process Management for Digital Twins

M Ahmann, M Benedikt, C Pahl… - 2022 6th International …, 2022 - ieeexplore.ieee.org
In recent years, the concept of Digital Twins (DTs) has been implemented in different sectors
to support product lifecycle. However, because of a huge number of participants in the …

Transforming Cybersecurity: Leveraging Blockchain for Enhanced Threat Intelligence Sharing.

A El-Kosairy, H Aslan… - International Journal of …, 2024 - search.ebscohost.com
The number of cyberattacks has increased significantly, necessitating the establishment of
robust safeguards. To protect networks from intrusion, Cybersecurity Threat Intelligence …

[HTML][HTML] Balancing Usability and Security in Secure System Design: A Comprehensive Study on Principles, Implementation, and Impact on Usability

TO Agboola, J Adegede, JG Jacob - International Journal of …, 2024 - stepacademic.net
Purpose-The purpose of this study is to provide a comprehensive analysis of the principles
and implementation strategies of secure system design, emphasizing the critical balance …