A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - Ieee …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

Cyber threats to industrial IoT: a survey on attacks and countermeasures

K Tsiknas, D Taketzis, K Demertzis, C Skianis - IoT, 2021 - mdpi.com
In today's Industrial Internet of Things (IIoT) environment, where different systems interact
with the physical world, the state proposed by the Industry 4.0 standards can lead to …

An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities

V Demertzi, S Demertzis, K Demertzis - Applied Sciences, 2023 - mdpi.com
A smart city is where existing facilities and services are enhanced by digital technology to
benefit people and companies. The most critical infrastructures in this city are …

Anomaly detection via blockchained deep learning smart contracts in industry 4.0

K Demertzis, L Iliadis, N Tziritas, P Kikiras - Neural Computing and …, 2020 - Springer
The complexity of threats in the ever-changing environment of modern industry is constantly
increasing. At the same time, traditional security systems fail to detect serious threats of …

[HTML][HTML] An overview of privacy dimensions on the industrial Internet of Things (IIoT)

V Demertzi, S Demertzis, K Demertzis - Algorithms, 2023 - mdpi.com
The rapid advancements in technology have given rise to groundbreaking solutions and
practical applications in the field of the Industrial Internet of Things (IIoT). These …

[HTML][HTML] The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks

K Demertzis, N Tziritas, P Kikiras, SL Sanchez… - Big Data and Cognitive …, 2019 - mdpi.com
A Security Operations Center (SOC) is a central technical level unit responsible for
monitoring, analyzing, assessing, and defending an organization's security posture on an …

Current security threats in the national and international context

LM Cristea - Journal of accounting and management information …, 2020 - ceeol.com
Research Question: What are the main security threats emphasized by national and
international surveys? Motivation: The rapid growth of IT brings worldwide security issues …

[HTML][HTML] Communication network standards for smart grid infrastructures

K Demertzis, K Tsiknas, D Taketzis, DN Skoutas… - Network, 2021 - mdpi.com
Upgrading the existing energy infrastructure to a smart grid necessarily goes through the
provision of integrated technological solutions that ensure the interoperability of business …

Identifying data streams anomalies by evolving spiking restricted Boltzmann machines

L **ng, K Demertzis, J Yang - Neural Computing and Applications, 2020 - Springer
Data streams are characterized by high volatility, and they drastically change in an
unpredictable way over time. In the typical case, newer data are the most important, as the …