[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

Security and internet of things: benefits, challenges, and future perspectives

H Taherdoost - Electronics, 2023 - mdpi.com
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate
their efforts on system security. Any vulnerability could lead to a system failure or …

Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …

Role of machine learning and deep learning in securing 5G-driven industrial IoT applications

P Sharma, S Jain, S Gupta, V Chamola - Ad Hoc Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …

[HTML][HTML] Forensic analysis on internet of things (IoT) device using machine-to-machine (M2M) framework

MS Mazhar, Y Saleem, A Almogren, J Arshad… - Electronics, 2022 - mdpi.com
The versatility of IoT devices increases the probability of continuous attacks on them. The
low processing power and low memory of IoT devices have made it difficult for security …

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

A systematic survey: Security threats to UAV-aided IoT applications, taxonomy, current challenges and requirements with future research directions

M Adil, MA Jan, Y Liu, H Abulkasim… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful
communication paradigm for different Internet of Things (IoT) applications. Following the …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

IoT-enabled water distribution systems—A comparative technological review

NK Velayudhan, P Pradeep, SN Rao… - IEEE …, 2022 - ieeexplore.ieee.org
Water distribution systems are one of the critical infrastructures and major assets of the water
utility in a nation. The infrastructure of the distribution systems consists of resources …

Application of internet of things in healthcare domain

KH Almotairi - Journal of Umm Al-Qura University for Engineering and …, 2023 - Springer
Internet of things (IoT) enables machine-to-machine, human-to-human and machine-to-
human interaction. Recent advancement in IoT systems has positively impacted the daily …