A Falcetta, M Roveri - Neural Computing and Applications, 2024 - Springer
One of the main concerns of cloud-based services based on machine and deep learning algorithms is the privacy of users' data. This is particularly relevant when companies want to …
IoT devices have become indispensable components of our lives, and the advancement of AI technologies will make them even more pervasive, increasing the vulnerability to …
Anomaly detection is a protocol that detects integrity attacks on control systems by comparing the residue signal with a threshold. Implementing anomaly detection on …
Cloud-based control systems leverage cloud computing to provide scalable services and real-time resource access over the internet. However, they face vulnerabilities such as …
Security and privacy are significant concerns in realizing dependable cyberphysical systems. To ensure the security and privacy of these systems, systems and control …