Cyber threats to smart grids: Review, taxonomy, potential solutions, and future directions

J Ding, A Qammar, Z Zhang, A Karim, H Ning - Energies, 2022 - mdpi.com
Smart Grids (SGs) are governed by advanced computing, control technologies, and
networking infrastructure. However, compromised cybersecurity of the smart grid not only …

Deep learning-based malicious smart contract detection scheme for internet of things environment

R Gupta, MM Patel, A Shukla, S Tanwar - Computers & Electrical …, 2022 - Elsevier
Smart contracts are essential in maintaining the trust between the members of the
blockchain. Its verification is of utmost importance, as it is unmodifiable once deployed …

SALT: transfer learning-based threat model for attack detection in smart home

P Anand, Y Singh, H Singh, MD Alshehri, S Tanwar - Scientific Reports, 2022 - nature.com
The next whooping revolution after the Internet is its scion, the Internet of Things (IoT), which
has facilitated every entity the power to connect to the web. However, this magnifying depth …

IVQFIoT: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities

P Anand, Y Singh, A Selwal, PK Singh… - Expert …, 2022 - Wiley Online Library
With time smart services have become more domineering than ever before however, the
pertinent security considerations fade to correspond with growing heterogeneity in the …

A universal testbed for IOT wireless technologies: Abstracting latency, error rate and stability from the IOT protocol and hardware platform

E Saavedra, L Mascaraque, G Calderon, G Del Campo… - Sensors, 2022 - mdpi.com
IoT applications rely strongly on the performance of wireless communication networks.
There is a wide variety of wireless IoT technologies and choosing one over another depends …

An iot digital twin for cyber-security defence based on runtime verification

JD de Hoz Diego, A Temperekidis, P Katsaros… - … Applications of Formal …, 2022 - Springer
A security decoupling approach for IoT device communications is presented, based on a
Digital Twin with runtime verification capabilities. The solution proposed assumes that a …

Security risk analysis in IoT systems through factor identification over IoT devices

RO Andrade, SG Yoo, I Ortiz-Garces, J Barriga - Applied Sciences, 2022 - mdpi.com
IoT systems contribute to digital transformation through the development of smart concepts.
However, the IoT has also generated new security challenges that require security tools to …

Collection and utilization of indoor environmental quality information using affordable image sensing technology

J Lee, DO Woo, J Jang, L Junghans, SB Leigh - Energies, 2022 - mdpi.com
Incorporating Internet of Things (IoT) technology into the operation of buildings is expected
to generate immense synergy, thereby saving energy and improving occupant comfort by …

Security of digitalized process systems

AH El-Kady, S Halim, H Pasman, F Khan - Methods in Chemical Process …, 2022 - Elsevier
The pervasive adoption of digitalized systems along with evolving security threats has led to
major security concerns. Digitalization enablers, such as Internet of Things (IoT) and Cyber …

Internet of things (IOT) system security vulnerabilities and its mitigation

AB Patel, PR Sharma, P Randhawa - Security and Privacy in Cyberspace, 2022 - Springer
The Internet is the most important technology created, like a fabric woven into each of our
lives. Over the years the internet has evolved into the Internet of Things (IoT), enabling the …