A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions
Software-defined networking (SDN) is a network paradigm that decouples control and data
planes from network devices and places them into separate entities. In SDN, the controller is …
planes from network devices and places them into separate entities. In SDN, the controller is …
[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
Cybersafe Capabilities and Utilities for Smart Cities
From the beginning of the 21st century, the entire world suffers from two critical problems:
the growth of the world population and the improvement of life expectancy of people owing …
the growth of the world population and the improvement of life expectancy of people owing …
Survey of contemporary open-source honeypots, frameworks, and tools
Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at
short notice. To identify such attacks as well as new cyber security threats, defenders use …
short notice. To identify such attacks as well as new cyber security threats, defenders use …
Smart grid: Cyber attacks, critical defense approaches, and digital twin
As a national critical infrastructure, the smart grid has attracted widespread attention for its
cybersecurity issues. The development towards an intelligent, digital, and Internetconnected …
cybersecurity issues. The development towards an intelligent, digital, and Internetconnected …
Hybrid cyber defense strategies using Honey-X: A survey
The development and adoption of network technologies reshape our daily life; however,
network-connected devices have become popular targets of cybercrimes. Honey-X-based …
network-connected devices have become popular targets of cybercrimes. Honey-X-based …
Flow based containerized honeypot approach for network traffic analysis: An empirical study
SC Sethuraman, TG Jadapalli, DPV Sudhakaran… - Computer Science …, 2023 - Elsevier
The world of connected devices has been attributed to applications that relied upon
multitude of devices to acquire and distribute data over extremely diverse networks. This …
multitude of devices to acquire and distribute data over extremely diverse networks. This …
Survey of cybersecurity governance, threats, and countermeasures for the power grid
The convergence of Information Technologies and Operational Technology systems in
industrial networks presents many challenges related to availability, integrity, and …
industrial networks presents many challenges related to availability, integrity, and …
Smart City Ecosystem: An Exploration of Requirements, Architecture, Applications, Security, and Emerging Motivations
This chapter explores the growing use of technology in various aspects of people's lives and
focuses on smart cities. First, it provides a comprehensive survey that examines the need for …
focuses on smart cities. First, it provides a comprehensive survey that examines the need for …