Role of IoT technologies in big data management systems: A review and Smart Grid case study

AR Al-Ali, R Gupta, I Zualkernan, SK Das - Pervasive and Mobile …, 2024 - Elsevier
Abstract Empowered by Internet of Things (IoT) and cloud computing platforms, the concept
of smart cities is making a transition from conceptual models to development and …

An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities

V Demertzi, S Demertzis, K Demertzis - Applied Sciences, 2023 - mdpi.com
A smart city is where existing facilities and services are enhanced by digital technology to
benefit people and companies. The most critical infrastructures in this city are …

Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

Anomaly detection via blockchained deep learning smart contracts in industry 4.0

K Demertzis, L Iliadis, N Tziritas, P Kikiras - Neural Computing and …, 2020 - Springer
The complexity of threats in the ever-changing environment of modern industry is constantly
increasing. At the same time, traditional security systems fail to detect serious threats of …

Humans and automation: Augmenting security operation centers

J Tilbury, S Flowerday - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Background: Open Access Systematic Review Humans and Automation: Augmenting
Security Operation Centers by Jack Tilbury and Stephen Flowerday* School of Cyber …

Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions

PV Mohan, S Dixit, A Gyaneshwar, U Chadha… - Sensors, 2022 - mdpi.com
With information systems worldwide being attacked daily, analogies from traditional warfare
are apt, and deception tactics have historically proven effective as both a strategy and a …

[HTML][HTML] Automation Bias and Complacency in Security Operation Centers

J Tilbury, S Flowerday - Computers, 2024 - mdpi.com
The volume and complexity of alerts that security operation center (SOC) analysts must
manage necessitate automation. Increased automation in SOCs amplifies the risk of …

Artificial intelligence applications in management information systems: a comprehensive systematic review with business analytics perspective

Hİ Çelebi - Artificial Intelligence Theory and Applications, 2021 - dergipark.org.tr
The need to solve very complex problems and the desire to model and understand human
behavior are the most important factors that trigger artificial intelligence studies. In addition …

Empowering Security Operation Center with Artificial Intelligence and Machine Learning–A Systematic Literature Review

M Khayat, E Barka, MA Serhani, F Sallabi… - IEEE …, 2025 - ieeexplore.ieee.org
Organizational cybersecurity relies heavily on security operation centers (SOCs) to protect
businesses and institutions from emerging cyber threats. In recent years, the complexity and …

SOC critical path: A defensive kill chain model

A Villalón-Huerta, HM Gisbert, I Ripoll-Ripoll - Ieee Access, 2022 - ieeexplore.ieee.org
Different kill chain models have been defined and analyzed to provide a common sequence
of actions followed in offensive cyber operations. These models allow analysts to identify …