A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques
Abstract Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this
decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier …
decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier …
Fast, reliable, and secure drone communication: A comprehensive survey
Drone security is currently a major topic of discussion among researchers and industrialists.
Although there are multiple applications of drones, if the security challenges are not …
Although there are multiple applications of drones, if the security challenges are not …
SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication
Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …
A comprehensive survey on the applications of blockchain for securing vehicular networks
Vehicular networks promise features such as traffic management, route scheduling, data
exchange, entertainment, and much more. With any large-scale technological integration …
exchange, entertainment, and much more. With any large-scale technological integration …
Role of machine learning and deep learning in securing 5G-driven industrial IoT applications
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …
stage for future technology where industrial use cases like smart cities and smart houses will …
A survey on network security for cyber–physical systems: From threats to resilient design
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …
world and control software in computing systems. In CPS, the real world and the computing …
XGBoost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems
The Industrial Internet of Things (IIoT) has advanced digital technology and the fastest
interconnection, which creates opportunities to substantially grow industrial businesses …
interconnection, which creates opportunities to substantially grow industrial businesses …
[HTML][HTML] CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders
Abstract Detecting attacks to Cyber-Physical Systems (CPSs) is of utmost importance, due to
their increasingly frequent use in many critical assets. Intrusion detection in CPSs and other …
their increasingly frequent use in many critical assets. Intrusion detection in CPSs and other …
A survey on supply chain security: Application areas, security threats, and solution architectures
The rapid improvement in the global connectivity standards has escalated the level of trade
taking place among different parties. Advanced communication standards are allowing the …
taking place among different parties. Advanced communication standards are allowing the …
A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …