[HTML][HTML] A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

[HTML][HTML] Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure

H Riggs, S Tufail, I Parvez, M Tariq, MA Khan, A Amir… - Sensors, 2023 - mdpi.com
Several critical infrastructures are integrating information technology into their operations,
and as a result, the cyber attack surface extends over a broad range of these infrastructures …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer Networks, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2023 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

[HTML][HTML] Internet of robotic things for mobile robots: concepts, technologies, challenges, applications, and future directions

H Kabir, ML Tham, YC Chang - Digital Communications and Networks, 2023 - Elsevier
Abstract Nowadays, Multi Robotic System (MRS) consisting of different robot shapes, sizes
and capabilities has received significant attention from researchers and are being deployed …

[HTML][HTML] Private 5G networks: a survey on enabling technologies, deployment models, use cases and research directions

S Eswaran, P Honnavalli - Telecommunication Systems, 2023 - Springer
Today's modern enterprises are adjusting to new realities of connectivity. As companies
become more distributed and autonomous, emerging applications demand more bandwidth …

[HTML][HTML] A comprehensive review of architecture, communication, and cybersecurity in networked microgrid systems

A Aghmadi, H Hussein, KH Polara, O Mohammed - Inventions, 2023 - mdpi.com
Networked microgrids (NMGs) are developing as a viable approach for integrating an
expanding number of distributed energy resources (DERs) while improving energy system …

[HTML][HTML] Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices

HU Khan, M Sohail, F Ali, S Nazir, YY Ghadi… - Physical …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technologies continuously expand with time due to the
advances in automated, connected device technology, mobility, and wide access to …

A systematic security assessment and review of Internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

[HTML][HTML] Security in Cloud-Native Services: A Survey

T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …