A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

IoT Privacy and security: Challenges and solutions

L Tawalbeh, F Muheidat, M Tawalbeh, M Quwaider - Applied Sciences, 2020 - mdpi.com
Privacy and security are among the significant challenges of the Internet of Things (IoT).
Improper device updates, lack of efficient and robust security protocols, user unawareness …

Metaverse: Survey, applications, security, and opportunities

J Sun, W Gan, HC Chao, PS Yu - arXiv preprint arXiv:2210.07990, 2022 - arxiv.org
As a fusion of various emerging digital technologies, the Metaverse aims to build a virtual
shared digital space. It is closely related to extended reality, digital twin, blockchain, and …

IoT elements, layered architectures and security issues: A comprehensive survey

M Burhan, RA Rehman, B Khan, BS Kim - sensors, 2018 - mdpi.com
The use of the Internet is growing in this day and age, so another area has developed to use
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies

C Xenofontos, I Zografopoulos… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications
spanning from the consumer domain to commercial and industrial systems. The steep …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

Cybersecurity of smart inverters in the smart grid: A survey

Y Li, J Yan - IEEE Transactions on Power Electronics, 2022 - ieeexplore.ieee.org
The penetration of distributed energy resources (DERs) in smart grids significantly increases
the number of field devices owned and controlled by consumers, aggregators, third parties …

Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data

F Zhang, HADE Kodituwakku… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The growing number of attacks against cyber-physical systems in recent years elevates the
concern for cybersecurity of industrial control systems (ICSs). The current efforts of ICS …