A critical overview of industrial internet of things security and privacy issues using a layer-based hacking scenario
AH Eyeleko, T Feng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
We have witnessed significant technological advancement over the past few years,
including the Internet of Things (IoT). The IoT's ability to connect consumer appliances to the …
including the Internet of Things (IoT). The IoT's ability to connect consumer appliances to the …
[HTML][HTML] A comparative study of post-quantum cryptographic algorithm implementations for secure and efficient energy systems monitoring
The Internet of Things (IoT) has assumed a pivotal role in the advancement of
communication technology and in our daily lives. However, an IoT system such as a smart …
communication technology and in our daily lives. However, an IoT system such as a smart …
Security analysis of cyber-physical systems using reinforcement learning
Future engineering systems with new capabilities that far exceed today's levels of autonomy,
functionality, usability, dependability, and cyber security are predicted to be designed and …
functionality, usability, dependability, and cyber security are predicted to be designed and …
Energy-aware and secure task offloading for multi-tier edge-cloud computing systems
Nowadays, Unmanned Aerial Vehicle (UAV) devices and their services and applications are
gaining popularity and attracting considerable attention in different fields of our daily life …
gaining popularity and attracting considerable attention in different fields of our daily life …
Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication
Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of
the Internet. Almost, all the applications have been shifted to smartphones. A person …
the Internet. Almost, all the applications have been shifted to smartphones. A person …
Security Assessment of Industrial Control System Applying Reinforcement Learning
Industrial control systems are often used to assist and manage an industrial operation.
These systems' weaknesses in the various hierarchical structures of the system components …
These systems' weaknesses in the various hierarchical structures of the system components …
A class integration test order generation approach based on Sarsa algorithm
Y Li, Y Zhang, Y Ding, S Jiang, G Yuan - Automated Software Engineering, 2024 - Springer
Class integration test order generation is a key step in integration testing, researching this
problem can help find unknown bugs and improve the efficiency of software testing. The …
problem can help find unknown bugs and improve the efficiency of software testing. The …
EFFICIENT PHYSICAL KEY GENERATION TECHNIQUE BASED ON CHANNEL CORRELATION AND TRANSFORM FUNCTION FOR THE INTERNET OF THINGS.
A Singh, S Sharma - Machine …, 2023 - machineintelligenceresearchs.com
In the context of the Internet of Things (IoT), devices often operate with constrained
computing resources and limited energy capacity. This limitation poses challenges for …
computing resources and limited energy capacity. This limitation poses challenges for …