A survey on ransomware: Evolution, taxonomy, and defense solutions

H Oz, A Aris, A Levi, AS Uluagac - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
In recent years, ransomware has been one of the most notorious malware targeting end-
users, governments, and business organizations. It has become a very profitable business …

Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure

H Riggs, S Tufail, I Parvez, M Tariq, MA Khan, A Amir… - Sensors, 2023 - mdpi.com
Several critical infrastructures are integrating information technology into their operations,
and as a result, the cyber attack surface extends over a broad range of these infrastructures …

Group key management in internet of things: A systematic literature review

F Samiullah, ML Gan, S Akleylek, Y Aun - IEEE Access, 2023 - ieeexplore.ieee.org
IoT networks are gaining popularity in terms of group networks built by sensor nodes and
other IoT-related devices. The significance of cryptography protocols for secure …

Cybersecurity in the Smart Grid: Practitioners' Perspective

J Meyer, G Apruzzese - arXiv preprint arXiv:2210.13119, 2022 - arxiv.org
The Smart Grid (SG) is a cornerstone of modern society, providing the energy required to
sustain billions of lives and thousands of industries. Unfortunately, as one of the most critical …

Efficient Group Key Management for Resilient Operation of LoRaWAN-Based Smart Grid Applications

Y Hanna, M Cebe, J Leon… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent developments in low-rate wide-area wireless technologies will enable the
deployment of publish–subscribe architectures that can span larger geographical areas in …

Development and evaluation of a publish/subscribe IoT data sharing model with LoRaWAN

J Leon, Y Hanna, K Akkaya - Open Journal of Internet Of Things (OJIOT …, 2022 - ronpub.com
Publish/subscribe architectures are becoming very common for many IoT environments such
as power grid, manufacturing and factory automation. In these architectures, many different …

A Novel Authentication Management for the Data Security of Smart Grid

I Parvez, M Aghili, H Riggs… - IEEE Open Access …, 2024 - ieeexplore.ieee.org
Bidirectional wireless communication is employed in various smart grid components such as
smart meters and control and monitoring applications where security is vital. The Trusted …

Enhancing the LoRaWAN Publish/Subscribe IoT Data Sharing Model Using Middleman for Smart Grid Application

SS Khapre, R Ganeshan - Wireless Personal Communications, 2024 - Springer
The power grid, manufacturing, and industrial automation are just a few Internet of Things
(IoT) settings where publish/subscribe (p/s) systems are increasingly prevalent. These …

Incremental Threshold Scheme Enabled IoT Group Key Management

M Li, SC Hollifield… - 2023 7th Cyber Security in …, 2023 - ieeexplore.ieee.org
Cyber landscape evolves rapidly. Internet of Things (IoT) and Edge Computing (EC) have
rapidly become an integral part of the modern computing infrastructure. It is expected that …

[PDF][PDF] A Review of Advanced Cyber Threat Detection Techniques in Critical Infrastructure: Evolution, Current State, and Future Directions

M AMINU, A AKINSANYA, O OYEDOKUN, O TOSIN - 2024 - researchgate.net
Cyber threats pose substantial risks to critical infrastructure, necessitating the development
and implementation of advanced detection techniques to protect against possible attacks …