[HTML][HTML] Secure edge computing vulnerabilities in smart cities sustainability using petri net and genetic algorithm-based reinforcement learning

LA Ajao, ST Apeh - Intelligent Systems with Applications, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) revolution has emerged as a promising
network that enhanced information dissemination about the city's resources. This city's …

A weighted fuzzy Petri-net analysis for Indian foodgrains supply chain

R Rathore, J Thakkar, JK Jha - International Journal of Productivity …, 2024 - emerald.com
Purpose This paper investigates the overall system risk for a foodgrains supply chain
capturing the interrelationship among the risk factors and the effect of risk mitigation …

[图书][B] Intelligent Systems and Applications: Proceedings of the 2023 Intelligent Systems Conference (IntelliSys).

K Arai - 2024 - books.google.com
The book is a unique collection of studies involving intelligent systems and applications of
artificial intelligence in the real world to provide solutions to most vexing problems. IntelliSys …

Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4. 0)

VH dos Santos Filho, LMM de Resende, J Pontes - Future Internet, 2024 - mdpi.com
Development of a Theoretical Model for Digital Risks Arising from the Implementation of
Industry 4.0 (TMR-I4.0) Page 1 Future Internet 2024, 16, 215. https://doi.org/10.3390/fi16060215 …

Petri Net-Based Attack Modeling for Industrial Control System Networks

Y Wang, Z Lv, Y Zhang, Y Xiao, X Hei - China Intelligent Robotics Annual …, 2022 - Springer
Industrial control systems have been deeply involved in industrial facilities and
infrastructure. With the integrated development of industry and information technology …

A security risk assessment approach using enterprise architecture models to support decision-making at security operation centres

S Narain - 2021 - essay.utwente.nl
As the cyber threat landscape rapidly changes, organizations want to stay updated on how
they can protect their valuable assets. Carrying out a risk assessment on their critical asset …

Сравнительный анализ методов моделирования угроз информационной системы

АЕ Сорокина - Информационные технологии в науке, бизнесе и …, 2022 - elibrary.ru
В современном мире, в эпоху цифровизации, информация является одним из наиболее
критических ресурсов. Как следствие, информационные системы различных …