IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review

I Idrissi, M Azizi, O Moussaoui - 2020 Fourth international …, 2020 - ieeexplore.ieee.org
In the recent years, Internet of things (IoT) is rising increasingly to become a big research
topic due to the billions of devices dispatched around the world. These devices are …

IoT Privacy and security: Challenges and solutions

L Tawalbeh, F Muheidat, M Tawalbeh, M Quwaider - Applied Sciences, 2020 - mdpi.com
Privacy and security are among the significant challenges of the Internet of Things (IoT).
Improper device updates, lack of efficient and robust security protocols, user unawareness …

Internet of Things: Evolution and technologies from a security perspective

R Ande, B Adebisi, M Hammoudeh, J Saleem - Sustainable Cities and …, 2020 - Elsevier
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …

Securing interim payments in construction projects through a blockchain-based framework

M Das, H Luo, JCP Cheng - Automation in construction, 2020 - Elsevier
Interim payment provisions in construction projects are susceptible to unfair practices. In
construction project participants with varying financial capacities belonging to different …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

Multilayer resilience paradigm against cyber attacks in DC microgrids

S Sahoo, T Dragičević… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recent advancements in dc microgrids are largely based on distributed control strategies to
enhance their reliability. However, due to numerous vulnerabilities in the communication …

Optimal partial feedback attacks in cyber-physical power systems

G Wu, G Wang, J Sun, J Chen - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article considers false data injection attacks constructed based on partial feedback of
generator frequencies in a cyber-physical power system. The goal of the attacker is to …

[PDF][PDF] Man in the middle attacks: Analysis, motivation and prevention

D Javeed, U MohammedBadamasi… - International Journal of …, 2020 - academia.edu
Computer systems and applications are improving day by day and with the advancement in
such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of …

A localized event-driven resilient mechanism for cooperative microgrid against data integrity attacks

S Sahoo, JCH Peng - IEEE Transactions on Cybernetics, 2020 - ieeexplore.ieee.org
This article investigates the impact of data integrity attacks (DIAs) on cooperative economic
dispatch of distributed generators (DGs) in an ac microgrid. To establish resiliency against …

Traffic data classification to detect man-in-the-middle attacks in industrial control system

H Lan, X Zhu, J Sun, S Li - 2019 6th International Conference …, 2020 - ieeexplore.ieee.org
Industrial Control Systems (ICS) are widely used in critical infrastructure in industries such
as power, rail transit, and water conservancy. As the connection between the corporate …