Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review

M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …

Cybersecurity Risk Analysis in the IoT: A Systematic Review

TS AlSalem, MA Almaiah, A Lutfi - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This …

Enterprise architecture modeling for cybersecurity analysis in critical infrastructures-A systematic literature review

Y Jiang, MA Jeusfeld, M Mosaad, N Oo - International Journal of Critical …, 2024 - Elsevier
As digital landscapes become increasingly complex, safeguarding sensitive information and
systems against cyber threats has become a paramount concern for organizations. This …

Electronic user authentication key for access to HMI/SCADA via unsecured internet networks

AT Abu-Jassar, H Attar, V Yevsieiev… - Computational …, 2022 - Wiley Online Library
This paper discusses the development of new hardware and software for protecting access
to HMI/SCADA systems via Unprotected Internet Networks (UPN), mainly when working …

A survey on cyber risk management for the Internet of Things

EK Parsons, E Panaousis, G Loukas, G Sakellari - Applied Sciences, 2023 - mdpi.com
The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the
daily operations of individuals and organisations. IoT systems automate crucial services …

Factors of Risk Analysis for IoT Systems

R Andrade, I Ortiz-Garcés, X Tintin, G Llumiquinga - Risks, 2022 - mdpi.com
The increasing rate at which IoT technologies are being developed has enabled smarter
and innovative solutions in the sectors of health, energy, transportation, etc. Unfortunately …

Cyber Security Risk management with attack detection frameworks using multi connect variational auto-encoder with probabilistic Bayesian networks

S Mouti, SK Shukla, SA Althubiti, MA Ahmed… - Computers and …, 2022 - Elsevier
This research proposes novel techniques in cyber security risk management and attack
detection frameworks using deep learning architectures. Here the risk management of …

Zero-tolerance security paradigm for enterprise-specific industrial internet of things

U Tariq - Electronics, 2022 - mdpi.com
The complex industrial environment of the 21st century is equipped with the Internet of
Things platform, with the objective of real-time operational visibility, improved device …

[PDF][PDF] Smart Cities' Cybersecurity and IoT: Challenges and Future Research Directions.

KK Ishak, NA Mat Razali, NA Malizan, G Sulong… - … International Journal of …, 2024 - iaeng.org
Smart Cities rely on the Internet of Things (IoT) which is characterised by its diverse,
distributed and complex infrastructure. These complexities present a range of cybersecurity …

Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture

N Moreta, D Aragon, S Oña, A Jaramillo… - Cybersecurity in the Age …, 2023 - Springer
This research presents the collection of data from different cybersecurity methodologies
used for securing IoT environments, of which a few were chosen for the validation of …