A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Digital twin: A comprehensive survey of security threats

C Alcaraz, J Lopez - IEEE Communications Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …

A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services

I Stellios, P Kotzanikolaou, M Psarakis… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …

Security threats, countermeasures, and challenges of digital supply chains

B Hammi, S Zeadally, J Nebhen - ACM Computing Surveys, 2023 - dl.acm.org
The rapid growth of Information Communication Technologies (ICT) has impacted many
fields. In this context, the supply chain has also quickly evolved toward the digital supply …

Industrial control systems: Cyberattack trends and countermeasures

T Alladi, V Chamola, S Zeadally - Computer Communications, 2020 - Elsevier
It is generally understood that an attacker with limited resources would not be able to carry
out targeted attacks on Industrial Control Systems. Breaking this general notion, we present …

Harnessing artificial intelligence capabilities to improve cybersecurity

S Zeadally, E Adi, Z Baig, IA Khan - Ieee Access, 2020 - ieeexplore.ieee.org
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …

A novel hierarchical intrusion detection system based on decision tree and rules-based models

A Ahmim, L Maglaras, MA Ferrag… - … Computing in Sensor …, 2019 - ieeexplore.ieee.org
This paper proposes a novel intrusion detection system (IDS) that combines different
classifier approaches which are based on decision tree and rules-based concepts, namely …

Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks

MA Ferrag, L Maglaras, A Ahmim, M Derdour… - Future internet, 2020 - mdpi.com
This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-
Things (IoT) networks. The RDTIDS combines different classifier approaches which are …

Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions

SH Mekala, Z Baig, A Anwar, S Zeadally - Computer Communications, 2023 - Elsevier
IIoT is evolving as the future of system and process integration across Operations
Technology (OT) and Information Technology (IT). The dynamic nature of OT and IT across …

Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective

UPD Ani, H He, A Tiwari - Journal of Cyber Security Technology, 2017 - Taylor & Francis
Nowadays, the industrial sector is being challenged by several cybersecurity concerns.
Direct attacks by malicious persons and (or) software form part of the severe jeopardies of …