Digital twin: A comprehensive survey of security threats

C Alcaraz, J Lopez - IEEE Communications Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …

The watchful eye: investigating tourist perceptions of different wireless tracking technologies at a travel destination

S Lee, B Sung, J Kitin - Current Issues in Tourism, 2024 - Taylor & Francis
Wireless tracking technologies is an emerging technology used in tourism destinations to
better understand the movement of tourists and to develop more personalized products …

A novel user centric privacy mechanism in cyber physical system

MK Yogi, ASN Chakravarthy - Computers & Security, 2025 - Elsevier
User-centric privacy preservation is of paramount importance in the realm of Cyber-Physical
Systems (CPS), where making decisions based on nature of data is crucial. This abstract …

Cloud-based cyber physical systems: Design challenges and security needs

YB Reddy - 2014 10th International Conference on Mobile Ad …, 2014 - ieeexplore.ieee.org
The cyber-physical systems are the combination of computational elements and physical
entities that can interact with humans through many modalities. The security includes the …

Guidelines for data privacy compliance: A focus on cyber-physical systems and internet of things

N Baloyi, P Kotzé - Proceedings of the South African Institute of …, 2019 - dl.acm.org
Privacy as a human right has been in existence for decades, but its effects are accentuated
in the information age. Data privacy compliance in modern information technology …

Lightweight password hashing scheme for embedded systems

G Hatzivasilis, I Papaefstathiou, C Manifavas… - … Security Theory and …, 2015 - Springer
Passwords constitute the main mean for authentication in computer systems. In order to
maintain the user-related information at the service provider end, password hashing …

A pattern-based approach for designing reliable cyber-physical systems

NE Petroulakis, G Spanoudakis… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) appear to be of paramount importance due to their
increasing use on critical infrastructure. New challenges have occurred because of the …

Wsacd-a usable access control framework for smart home devices

K Fysarakis, C Konstantourakis, K Rantos… - … Security Theory and …, 2015 - Springer
Computing devices already permeate working and living environments; a trend which is
expected to intensify in the coming years. However, the direct interaction smart devices often …

Embedded systems security for cyber-physical systems

S Ali, T Al Balushi, Z Nadir, OK Hussain, S Ali… - Cyber Security for Cyber …, 2018 - Springer
Embedded systems have become a core component in today's technological era.
Embedded systems are a combination of hardware and software specially designed to …

Log your car: reliable maintenance services record

H Mansor, K Markantonakis, RN Akram… - Information Security and …, 2017 - Springer
A maintenance services logging system is a useful tool for car owners to keep track of the
car's condition and also can increase the market value of the car. Logging systems range …