Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

A survey on recent advanced research of CPS security

Z Wang, W Xie, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …

Attestation of trusted and reliable service function chains in the ETSI-NFV framework

A Suriano, D Striccoli, G Piro, R Bolla… - 2020 6th IEEE …, 2020 - ieeexplore.ieee.org
The new generation of digital services are natively conceived as an ordered set of Virtual
Network Functions, deployed across boundaries and organizations. In this context, security …

A collective attestation scheme towards cloud system

Y Song, W Shi, B Qin, B Liang - Cluster computing, 2023 - Springer
Considering cloud computing continues to grow and flourish, the increasing number of cloud
infrastructures results in unlimited resources and convenient pay-as-you-go services, which …