Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …
A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …
addressing security challenges in cloud computing environments. It highlights the …
A generalizable deep neural network method for detecting attacks in industrial cyber-physical systems
Today's power systems utilize smart technology to improve the efficacy of power distribution.
Using cyber-physical components in the power system such as smart grids can introduce …
Using cyber-physical components in the power system such as smart grids can introduce …
Negotiation-based scheduling considering agent emotion
Scheduling in decentralized manufacturing systems is being expanded and transformed to a
smart level where manufacturing tasks are executed autonomously. However, achieving self …
smart level where manufacturing tasks are executed autonomously. However, achieving self …
IoT-DEW computing-inspired real-time monitoring of indoor environment for irregular health prediction
Internet of Things (IoT)-based monitoring, using smart sensors to gather contextual data, is
becoming the norm for making informed decisions. cyber-physical systems (CPS) play a …
becoming the norm for making informed decisions. cyber-physical systems (CPS) play a …
Optimal Deployment in Moving Target Defense against Coordinated Cyber–Physical Attacks via Game Theory
J Yu, Q Li - Electronics, 2023 - mdpi.com
This work proposes a method for the intelligent deployment of distributed flexible AC
transmission system (D-FACTS) devices. In recent years, in the field of moving target …
transmission system (D-FACTS) devices. In recent years, in the field of moving target …
Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions
Cyber–physical systems (CPSs) are being increasingly connected to the physical world,
making them attractive targets for cyber-attacks. The consequences of CPS cyber threats are …
making them attractive targets for cyber-attacks. The consequences of CPS cyber threats are …
A uav-assisted stackelberg game model for securing lomt healthcare networks
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged
as a promising technology to monitor patients' health and provide reliable medical services …
as a promising technology to monitor patients' health and provide reliable medical services …
A game theory approach for smart traffic management
The rapid increase in population and transportation resources presents numerous
challenges, including traffic congestion and accidents. This paper proposes a smart traffic …
challenges, including traffic congestion and accidents. This paper proposes a smart traffic …
[HTML][HTML] Understanding User Behavior for Enhancing Cybersecurity Training with Immersive Gamified Platforms
In modern digital infrastructure, cyber systems are foundational, making resilience against
sophisticated attacks essential. Traditional cybersecurity defenses primarily address …
sophisticated attacks essential. Traditional cybersecurity defenses primarily address …