Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Security analysis of IoT devices by using mobile computing: a systematic literature review

B Liao, Y Ali, S Nazir, L He, HU Khan - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices are operating in various domains like healthcare
environment, smart cities, smart homes, transportation, and smart grid system. These …

A holistic review of cybersecurity and reliability perspectives in smart airports

N Koroniotis, N Moustafa, F Schiliro… - IEEE …, 2020 - ieeexplore.ieee.org
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence
of smart airports. Services and systems powered by the IoT enable smart airports to have …

MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

Security in Internet of Things: A review

NA Khan, A Awang, SAA Karim - IEEE access, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is the paramount virtual network that enables remote users to access
connected multimedia devices. It has dragged the attention of the community because it …

A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud

J Liu, X Wang, S Shen, G Yue, S Yu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
To enhance dependable resource allocation against increasing distributed denial-of-service
(DDoS) attacks, in this article, we investigate interactions between a sensor device-edgeVM …

Risk assessment methodologies for the internet of medical things: A survey and comparative appraisal

V Malamas, F Chantzis, TK Dasaklis… - IEEE …, 2021 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) has revolutionized health care services by providing
significant benefits in terms of patient well being and relevant costs. Traditional risk …

Analysis of consumer IoT device vulnerability quantification frameworks

SA Baho, J Abawajy - Electronics, 2023 - mdpi.com
The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has
made them more appealing to attackers. Cyberattacks on IoT devices have the potential to …

Attack path detection for IIoT enabled cyber physical systems: Revisited

F Arat, S Akleylek - Computers & Security, 2023 - Elsevier
In this paper, we propose a generic vulnerability and risk assessment method for IIoT-
enabled critical systems. We focus on reducing risk factors and vulnerable structures in …

A polymorphic heterogeneous security architecture for edge-enabled smart grids

Z Wang, D Jiang, F Wang, Z Lv, R Nowak - Sustainable Cities and Society, 2021 - Elsevier
The emergence of edge computing alleviates the network congestion, delay, and packet
loss of cloud computing enabled smart grid architecture in big data scenarios, greatly …