Security and privacy in smart cities: Challenges and opportunities
Smart cities are expected to improve the quality of daily life, promote sustainable
development, and improve the functionality of urban systems. Now that many smart systems …
development, and improve the functionality of urban systems. Now that many smart systems …
A survey on cybersecurity knowledge graph construction
X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …
development of machine cognition technology, and the combination of KG and industry as …
Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem
Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data
spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid …
spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid …
Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things
Internet of Things (IoT) brings the third development wave of the global information industry,
which makes users, network, and perception devices cooperate more closely. However, if …
which makes users, network, and perception devices cooperate more closely. However, if …
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions
Recently in the connected digital world, targeted attack has become one of the most serious
threats to conventional computing systems. Advanced persistent threat (APT) is currently …
threats to conventional computing systems. Advanced persistent threat (APT) is currently …
Hierarchical intrusion detection using machine learning and knowledge model
Intrusion detection systems (IDS) present a critical component of network infrastructures.
Machine learning models are widely used in the IDS to learn the patterns in the network data …
Machine learning models are widely used in the IDS to learn the patterns in the network data …
A closer look at intrusion detection system for web applications
Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
web. IDS is a known methodology for detecting network‐based attacks but is still immature …
Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy
S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
Abstract The Industrial Internet of Things (IIoT) provides new opportunities to improve
process and production efficiency, which enable new business models. At the same time …
process and production efficiency, which enable new business models. At the same time …
Mitigating cybercrimes in an evolving organizational landscape
Purpose Various organizational landscapes have evolved to improve their business
processes, increase production speed and reduce the cost of distribution and have …
processes, increase production speed and reduce the cost of distribution and have …
Leveraging deep neural networks for anomaly‐based web application firewall
Web applications are the most common platforms for the exchange of information and
services on the Internet. With the launch of web 2.0, information has flourished through …
services on the Internet. With the launch of web 2.0, information has flourished through …