A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

An explainable ensemble deep learning approach for intrusion detection in industrial Internet of Things

MK Hasan, R Sulaiman, S Islam, AU Rehman - IEEE Access, 2023 - ieeexplore.ieee.org
Ensuring the security of critical Industrial Internet of Things (IIoT) systems is of utmost
importance, with a primary focus on identifying cyber-attacks using Intrusion Detection …

A novel IDS with a dynamic access control algorithm to detect and defend intrusion at IoT nodes

M Alazab, A Awajan, H Alazzam, M Wedyan, B Alshawi… - Sensors, 2024 - mdpi.com
The Internet of Things (IoT) is the underlying technology that has enabled connecting daily
apparatus to the Internet and enjoying the facilities of smart services. IoT marketing is …

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

C Dhasaratha, MK Hasan, S Islam… - CAAI Transactions …, 2024 - Wiley Online Library
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector
with rapid potential proof for decentralised communication systems that have been applied …

BDPM: A secure batch dynamic password management scheme in industrial internet environments

J Feng, R Yan, G Han, W Zhang - Future Generation Computer Systems, 2024 - Elsevier
The rapid development of Industrial Internet has promoted the deep integration of
Information Technology (IT) and Industrial Control (IC), so that network attacks have …

GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs

MR Al-Eiadeh, M Abdallah - Computers & Security, 2024 - Elsevier
We design a resource allocation framework for securing interdependent systems managed
by multiple defenders. Our framework models these multi-defender interdependent systems …

[HTML][HTML] Investigation of the cyber vulnerabilities of construction networks using an agent-based model

BRK Mantha, MS Sonkor, BG de Soto - Developments in the Built …, 2024 - Elsevier
Most studies either addressed the technical gaps or adopted technological strategies to
enable construction automation and digitalization. However, the cybersecurity implications …

Threat modelling in Internet of Things (IoT) environments using dynamic attack graphs

M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
This work presents a threat modelling approach to represent changes to the attack paths
through an Internet of Things (IoT) environment when the environment changes dynamically …

Optimal Estimation of Under-Frequency Load Shedding Scheme Parameters by Considering Virtual Inertia Injection

S Bustamante-Mesa, JW Gonzalez-Sanchez… - Energies, 2024 - mdpi.com
Under-frequency load shedding (UFLS) schemes are the latest safety measures applied for
safeguarding the integrity of the grid against abrupt frequency imbalances. The overall …

Key Vulnerable Nodes Discovery Based on Bayesian Attack Subgraphs and Improved Fuzzy C-Means Clustering

Y Xu, Y Liu, Z Sun, Y Xue, W Liao, C Liu, Z Sun - Mathematics, 2024 - mdpi.com
Aiming at the problem that the search efficiency of key vulnerable nodes in large-scale
networks is not high and the consideration factors are not comprehensive enough, in order …