Exploring the Efficacy of Lightweight Encryption Techniques: A Comprehensive Review

HHR al-Mahmood, SN Alsaad - Journal of Al-Qadisiyah for …, 2023 - jqcsm.qu.edu.iq
With the widespread adoption of applications and IoT devices, modern society has come to
rely on them in various aspects of daily life. These applications and devices cover a range of …

[PDF][PDF] AI-enabled Cybersecurity Framework for Industrial Control Systems

A Namavar Jahromi - 2022 - prism.ucalgary.ca
Abstract Industrial Control System (ICS), one type of Operational Technology (OT), plays an
essential role in monitoring and controlling critical infrastructures such as power plants …

Toward Efficient Protecting Cyber-Physical Systems with Cyber Threat Hunting and Intelligence

P Khordadpour - Authorea Preprints, 2023 - techrxiv.org
This study, via some possible contributions, suggests an effective CTI and CTH framework to
improve critical infrastructure security by creating a threat correlation engine, developing …

Machine Learning for Cyber Physical System: Advances and Challenges

J Nayak, B Naik, S Vimal, M Favorskaya - Springer
The integration of computers and physical systems, known as a cyber-physical system
(CPS), orchestrates a synergy between embedded computers and physical processes. This …

[PDF][PDF] Ensemble learning applications in multiple industries: A review

KY Lin, C Huang - Inf. Dyn. Appl, 2022 - library.acadlore.com
This study proposes a systematic review of the application of Ensemble learning (EL) in
multiple industries. This study aims to review prevailing application in multiple industries to …

[PDF][PDF] Internet of Things

SA Bakhsh, MA Khan, F Ahmed, MS Alshehri, H Ali… - researchgate.net
The rapid growth of the Internet of Things (IoT) has brought about a global concern for the
security of interconnected devices and networks. This necessitates the use of efficient …

[PDF][PDF] Cyber Security and Applications

WS Admass, YY Munaye, AA Diro - researchgate.net
abstract Cyber security has become a very critical concern that needs the attention of
researchers, academicians, and organizations to confidentially ensure the protection and …

[PDF][PDF] СПОСОБИ ЗАСТОСУВАННЯ ШТУЧНОГО ІНТЕЛЕКТУ В УПРАВЛІННІ КІБЕРНЕТИЧНОЮ БЕЗПЕКОЮ

ЯВ Ухань, ДО Сокуренко - Редакційна колегія - dut.edu.ua
145 у боротьбі з кіберзагрозами та способом вдосконалення систем управління
кібернетичною безпекою організацій. Використання алгоритмів машинного навчання …