[HTML][HTML] Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Smart grid metering networks: A survey on security, privacy and open research issues

P Kumar, Y Lin, G Bai, A Paverd… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Smart grid (SG) networks are newly upgraded networks of connected objects that greatly
improve reliability, efficiency, and sustainability of the traditional energy infrastructure. In this …

Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

Past, present, and future challenges of the marine vessel's electrical power system

E Skjong, R Volden, E Rødskar… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
The evolution of the use of electricity in marine vessels is presented and discussed in this
paper in an historical perspective. The historical account starts with its first commercial use …

Security for the robot operating system

B Dieber, B Breiling, S Taurer, S Kacianka… - Robotics and …, 2017 - Elsevier
Future robotic systems will be situated in highly networked environments where they
communicate with industrial control systems, cloud services or other systems at remote …

Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

Challenges in delivering software in the cloud as microservices

C Esposito, A Castiglione, KKR Choo - IEEE Cloud Computing, 2016 - ieeexplore.ieee.org
Microservices can be broadly defined as the design of service-oriented software using a set
of small services. In a microservice architecture, application complexity is distributed among …

Cloud manufacturing: security, privacy, and forensic concerns

C Esposito, A Castiglione, B Martini… - IEEE Cloud …, 2016 - ieeexplore.ieee.org
Cloud computing benefits from widespread adoption in every sector of our society and
economy, due, at least in part, to the promise of cost-effective and elastic provisioning of …

Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications

S Belguith, N Kaaniche, M Hammoudeh… - Future Generation …, 2020 - Elsevier
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …