Cyber-physical systems security: A systematic review

H Harkat, LM Camarinha-Matos, J Goes… - Computers & Industrial …, 2024 - Elsevier
In recent years, cyber-physical systems (CPS) have been to many vital areas, including
medical devices, smart cars, industrial systems, energy grid, etc. As these systems …

Cybersecurity risk assessment: a systematic map** review, proposal, and validation

ID Sánchez-García, J Mejía, T San Feliu Gilabert - Applied Sciences, 2022 - mdpi.com
Incorporating technologies across all sectors has meant that cybersecurity risk assessment
is now a critical step in cybersecurity risk management. However, risk assessment can be a …

[HTML][HTML] Global digital convergence: Impact of cybersecurity, business transparency, economic transformation, and AML efficiency

A Kuzior, T Vasylieva, O Kuzmenko… - Journal of Open …, 2022 - mdpi.com
The article substantiates the existence of convergence processes in the field of digitization of
countries, taking into account the number of Internet users; people with advanced skills; and …

A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making

M Dekker, L Alevizos - Security and Privacy, 2024 - Wiley Online Library
The challenge of decision‐making under uncertainty in information security has become
increasingly important, given the unpredictable probabilities and effects of events in the ever …

Industry 4.0: a proposal of paradigm organization schemes from a systematic literature review

C Rocha-Jácome, RG Carvajal, FM Chavero… - Sensors, 2021 - mdpi.com
Currently, the concept of Industry 4.0 is well known; however, it is extremely complex, as it is
constantly evolving and innovating. It includes the participation of many disciplines and …

GLHAD: A group lasso-based hybrid attack detection and localization framework for multistage manufacturing systems

A Kokhahi, D Li - Journal of Computing and …, 2024 - asmedigitalcollection.asme.org
As Industry 4.0 and digitization continue to advance, the reliance on information technology
increases, making the world more vulnerable to cyberattacks, especially cyber-physical …

[HTML][HTML] Security requirements prioritization techniques: a survey and classification framework

S Khanneh, V Anu - Software, 2022 - mdpi.com
Security requirements Engineering (SRE) is an activity conducted during the early stage of
the SDLC. SRE involves eliciting, analyzing, and documenting security requirements …

The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de …

DW Kiseki, V Havyarimana, T Niyonsaba… - Journal of Computer and …, 2023 - scirp.org
This study pursues the objective of analyzing and verifying the knowledge of the agents of
the Institut Supérieur Pédagogique/ISP-Bukavu (TTC= Teachers' training College) in relation …

VulRG: Multi-Level Explainable Vulnerability Patch Ranking for Complex Systems Using Graphs

Y Jiang, N Oo, Q Meng, HW Lim, B Sikdar - arxiv preprint arxiv …, 2025 - arxiv.org
As interconnected systems proliferate, safeguarding complex infrastructures against an
escalating array of cyber threats has become an urgent challenge. The increasing number of …