Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

A unified deep learning anomaly detection and classification approach for smart grid environments

I Siniosoglou, P Radoglou-Grammatikis… - … on Network and …, 2021 - ieeexplore.ieee.org
The interconnected and heterogeneous nature of the next-generation Electrical Grid (EG),
widely known as Smart Grid (SG), bring severe cybersecurity and privacy risks that can also …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Securing the smart grid: A comprehensive compilation of intrusion detection and prevention systems

PI Radoglou-Grammatikis, PG Sarigiannidis - Ieee Access, 2019 - ieeexplore.ieee.org
The smart grid (SG) paradigm is the next technological leap of the conventional electrical
grid, contributing to the protection of the physical environment and providing multiple …

Malware dynamic analysis evasion techniques: A survey

A Afianian, S Niksefat, B Sadeghiyan… - ACM Computing Surveys …, 2019 - dl.acm.org
The cyber world is plagued with ever-evolving malware that readily infiltrate all defense
mechanisms, operate viciously unbeknownst to the user, and surreptitiously exfiltrate …

An entropy-based network anomaly detection method

P Bereziński, B Jasiul, M Szpyrka - Entropy, 2015 - mdpi.com
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …

The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0

D Preuveneers, E Ilie-Zudor - Journal of Ambient Intelligence …, 2017 - content.iospress.com
Strongly rooted in the Internet of Things and Cyber-Physical Systems-enabled
manufacturing, disruptive paradigms like the Factory of the Future and Industry 4.0 envision …

Applying long short-term memory recurrent neural networks to intrusion detection

RC Staudemeyer - South African Computer Journal, 2015 - journals.co.za
We claim that modelling network traffic as a time series with a supervised learning approach,
using known genuine and malicious behaviour, improves intrusion detection. To …