A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures

X Shao, L Xie, C Li, Z Wang - Journal of Intelligent & Robotic Systems, 2023 - Springer
The recent integration and collaboration of robots with networks expose new challenges and
problems in terms of security. However, to the best of our knowledge, there has not been any …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

A quality-of-service-aware service composition method in the internet of things using a multi-objective fuzzy-based hybrid algorithm

M Hamzei, S Khandagh, N Jafari Navimipour - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) represents a cutting-edge technical domain, encompassing
billions of intelligent objects capable of bridging the physical and virtual worlds across …

An efficient and privacy-preserving blockchain-based secure data aggregation in smart grids

A Mahmood, A Khan, A Anjum, C Maple… - … Energy Technologies and …, 2023 - Elsevier
Abstract Smart Grids (SGs) present a number of advantages over traditional grid like reduce
energy cost, reduce energy wastage, and increase reliability and transparency. However, it …

Social media platform-oriented topic mining and information security analysis by big data and deep convolutional neural network

C Wang - Technological Forecasting and Social Change, 2024 - Elsevier
The aim of this work is to conduct topic mining and data analysis of social network security
using social network-based big data. The deep convolution neural network (DCNN) is used …

[HTML][HTML] A novel routing optimization strategy based on reinforcement learning in perception layer networks

H Tan, T Ye, S ur Rehman, O ur Rehman, S Tu… - Computer Networks, 2023 - Elsevier
Wireless sensor networks have become incredibly popular due to the Internet of Things'(IoT)
rapid development. IoT routing is the basis for the efficient operation of the perception-layer …

[PDF][PDF] Improved LSTM-Based Anomaly Detection Model with Cybertwin Deep Learning to Detect Cutting-Edge Cybersecurity Attacks

S Sengan, A Mehbodniya, JL Webber… - HUMAN-CENTRIC …, 2023 - hcisj.com
Anomalies in the time series may indicate future faults—real-time system state monitoring
and early alerting demand novel computational anomaly detection methods. Internet of …

Securing web applications against XSS and SQLi attacks using a novel deep learning approach

JR Tadhani, V Vekariya, V Sorathiya, S Alshathri… - Scientific Reports, 2024 - nature.com
Modern web application development involves handling enormous amounts of sensitive and
consequential data. Security is, therefore, a crucial component of developing web …

Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the Industrial Internet of Things

T Hai, A Sarkar, M Aksoy, MZ Khan… - Engineering Applications of …, 2024 - Elsevier
This paper presents an innovative solution to the key exchange problem in the Industrial
Internet of Things (IIoT) implementation. Communication between connected devices must …

A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models

A Heidari, NJ Navimipour, H Dag, S Talebi… - Cognitive Computation, 2024 - Springer
In recent years, the proliferation of deep learning (DL) techniques has given rise to a
significant challenge in the form of deepfake videos, posing a grave threat to the authenticity …