Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
Cybersecurity Risk Analysis in the IoT: A Systematic Review
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This …
significant concerns about future cybersecurity risks and the need for reliable solutions. This …
Enterprise architecture modeling for cybersecurity analysis in critical infrastructures-A systematic literature review
As digital landscapes become increasingly complex, safeguarding sensitive information and
systems against cyber threats has become a paramount concern for organizations. This …
systems against cyber threats has become a paramount concern for organizations. This …
Electronic user authentication key for access to HMI/SCADA via unsecured internet networks
This paper discusses the development of new hardware and software for protecting access
to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working …
to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working …
A survey on cyber risk management for the Internet of Things
The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the
daily operations of individuals and organisations. IoT systems automate crucial services …
daily operations of individuals and organisations. IoT systems automate crucial services …
Factors of Risk Analysis for IoT Systems
The increasing rate at which IoT technologies are being developed has enabled smarter
and innovative solutions in the sectors of health, energy, transportation, etc. Unfortunately …
and innovative solutions in the sectors of health, energy, transportation, etc. Unfortunately …
Cyber Security Risk management with attack detection frameworks using multi connect variational auto-encoder with probabilistic Bayesian networks
This research proposes novel techniques in cyber security risk management and attack
detection frameworks using deep learning architectures. Here the risk management of …
detection frameworks using deep learning architectures. Here the risk management of …
Zero-tolerance security paradigm for enterprise-specific industrial internet of things
U Tariq - Electronics, 2022 - mdpi.com
The complex industrial environment of the 21st century is equipped with the Internet of
Things platform, with the objective of real-time operational visibility, improved device …
Things platform, with the objective of real-time operational visibility, improved device …
[PDF][PDF] Smart Cities' Cybersecurity and IoT: Challenges and Future Research Directions.
KK Ishak, NA Mat Razali, NA Malizan, G Sulong… - … International Journal of …, 2024 - iaeng.org
Smart Cities rely on the Internet of Things (IoT) which is characterised by its diverse,
distributed and complex infrastructure. These complexities present a range of cybersecurity …
distributed and complex infrastructure. These complexities present a range of cybersecurity …
Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture
N Moreta, D Aragon, S Oña, A Jaramillo… - Cybersecurity in the Age …, 2023 - Springer
This research presents the collection of data from different cybersecurity methodologies
used for securing IoT environments, of which a few were chosen for the validation of …
used for securing IoT environments, of which a few were chosen for the validation of …