[HTML][HTML] Cyber-physical attack and the future energy systems: A review

SY Diaba, M Shafie-khah, M Elmusrati - Energy Reports, 2024 - Elsevier
As the world increasingly relies on interconnected energy systems, the threat of cyber-
physical attacks on these vital infrastructures has escalated, posing significant challenges to …

Complex event processing for physical and cyber security in datacentres-recent progress, challenges and recommendations

KA Alaghbari, MHM Saad, A Hussain… - Journal of Cloud …, 2022 - Springer
A datacentre stores information and manages data access in fast and reliable manner.
Failure of datacentre operation is not an option and can be catastrophic. Internet of things …

Towards continuous threat defense: In-network traffic analysis for IoT gateways

M Zang, C Zheng, L Dittmann… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The widespread use of IoT devices has unveiled overlooked security risks. With the advent
of ultrareliable low-latency communications (URLLCs) in 5G, fast threat defense is critical to …

Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors

J Azimjonov, T Kim - Computers & Security, 2024 - Elsevier
Intrusion detection systems (IDSs) play a crucial role in ensuring the security and integrity of
Internet of Things (IoT) networks by blocking unwanted packets and facilitating secure traffic …

An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection

J Roldán-Gomez, J Martínez del Rincon… - Wireless …, 2024 - Springer
In recent years, the Internet of Things (IoT) has grown rapidly, as has the number of attacks
against it. Certain limitations of the paradigm, such as reduced processing capacity and …

Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things

D Manivannan - Journal of Network and Computer Applications, 2024 - Elsevier
The significant advancements in sensors and other resource-constrained devices, capable
of collecting data and communicating wirelessly, are poised to revolutionize numerous …

Challenges in Blockchain as a Solution for IoT Ecosystem Threats and Access Control: A Survey

SC Avik, S Biswas, MAR Ahad, Z Latif… - arXiv preprint arXiv …, 2023 - arxiv.org
The Internet of Things (IoT) is increasingly influencing and transforming various aspects of
our daily lives. Contrary to popular belief, it raises security and privacy issues as it is used to …

Evaluating the Role of Secure Shell (SSH) in Securing Wireless Networks

SK Jangid, R Saini, R Kumar… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Cozy Shell (SSH) is an essential device for securing wireless networks. SSH is a cozy
protocol that provides relaxed authentication, records confidentiality, and integrity for Wi-Fi …

An Assessment of the Security Benefits of Secure Shell (SSH) in Wireless Networks

M Preetha, D Dhabliya, ZA Lone… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
Comfortable Shell (SSH) is a community protocol that provides relaxed communique over an
unsecured community, such as the internet. This protocol is generally used for far flung …

[引用][C] Organizational information security threats: Status and challenges

BO Akello - World Journal of Advanced …, 2024 - World Journal of Advanced …