Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review

M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …

A survey on threat-modeling techniques: protected objects and classification of threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - Symmetry, 2022 - mdpi.com
Information security is one of the most important attributes of distributed systems that often
operate on unreliable networks. Enabling security features during the development of a …

Cybersecurity and data science

K Szczypiorski - Electronics, 2022 - mdpi.com
Towards the end of the Cold War in 1985, in reference to the theory of leadership for the first
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …

Research on the effectiveness of cyber security awareness in ICS risk assessment frameworks

K Wang, X Guo, D Yang - Electronics, 2022 - mdpi.com
Assessing security awareness among users is essential for protecting industrial control
systems (ICSs) from social engineering attacks. This research aimed to determine the effect …

Aac-iot: Attribute access control scheme for iot using lightweight cryptography and hyperledger fabric blockchain

S Alshehri, O Bamasag - Applied Sciences, 2022 - mdpi.com
The Internet of Things (IoT) is an integrated environment as it merges physical smart objects
to the Internet via wireless technologies to share data. The global connectivity of IoT devices …

Security Analysis of Low-Budget IoT Smart Home Appliances Embedded Software and Connectivity

K Murat, D Topyła, K Zdulski, M Marzęcki, J Bieniasz… - Electronics, 2024 - mdpi.com
This paper investigates the challenge of finding and analyzing security vulnerabilities
among widely available low-budget Internet of Things smart home appliances. It considers …

A Unified Taxonomy and Evaluation of IoT Security Guidelines

J Chen, D Anandayuvaraj, JC Davis… - arXiv preprint arXiv …, 2023 - arxiv.org
Cybersecurity concerns about Internet of Things (IoT) devices and infrastructure are growing
each year. In response, organizations worldwide have published IoT cybersecurity …

[PDF][PDF] Secure Over-the-Air Vehicle Updates using Trusted Execution Environments (TEE)

ACP Henriques - 2022 - repositorio-aberto.up.pt
Abstract Over-the-air (OTA) software update system has emerged as an important feature to
remotely analyze and upgrade the vehicle inside systems, coordinated by different ECUs …

Autonomous Robotic Technology and Conveyance for Supply Chain Management Using 5G Standards

H Manoharan, PR Kshirsagar, RR Chandan… - … of Research on …, 2022 - igi-global.com
The process of incorporating robotic technology and autonomous vehicles are increasing in
all applications where for all real-time application developments time and energy can be …

IoTrust-a HW/SW framework supporting security core baseline features for IoT

M Korona, B Zabołotny, F Kozioł… - … 18th Conference on …, 2023 - ieeexplore.ieee.org
The rapid growth of the Internet of Things has significant security implications. In the current
IoT security landscape, many institutions and entities are defining security requirements, but …