Security and privacy in smart cities: Challenges and opportunities

L Cui, G **e, Y Qu, L Gao, Y Yang - IEEE access, 2018 - ieeexplore.ieee.org
Smart cities are expected to improve the quality of daily life, promote sustainable
development, and improve the functionality of urban systems. Now that many smart systems …

A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem

SSL Chukkapalli, S Mittal, M Gupta… - Ieee …, 2020 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data
spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid …

Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things

G Xu, Y Cao, Y Ren, X Li, Z Feng - IEEE Access, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) brings the third development wave of the global information industry,
which makes users, network, and perception devices cooperate more closely. However, if …

A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions

S Singh, PK Sharma, SY Moon, D Moon… - The Journal of …, 2019 - Springer
Recently in the connected digital world, targeted attack has become one of the most serious
threats to conventional computing systems. Advanced persistent threat (APT) is currently …

Hierarchical intrusion detection using machine learning and knowledge model

M Sarnovsky, J Paralic - Symmetry, 2020 - mdpi.com
Intrusion detection systems (IDS) present a critical component of network infrastructures.
Machine learning models are widely used in the IDS to learn the patterns in the network data …

A closer look at intrusion detection system for web applications

N Agarwal, SZ Hussain - Security and Communication …, 2018 - Wiley Online Library
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …

Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy

S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
Abstract The Industrial Internet of Things (IIoT) provides new opportunities to improve
process and production efficiency, which enable new business models. At the same time …

Mitigating cybercrimes in an evolving organizational landscape

A Yeboah-Ofori, FA Opoku-Boateng - Continuity & Resilience Review, 2023 - emerald.com
Purpose Various organizational landscapes have evolved to improve their business
processes, increase production speed and reduce the cost of distribution and have …

Leveraging deep neural networks for anomaly‐based web application firewall

A Moradi Vartouni, M Teshnehlab… - IET Information …, 2019 - Wiley Online Library
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …