Security and privacy in smart cities: Challenges and opportunities

L Cui, G **e, Y Qu, L Gao, Y Yang - IEEE access, 2018 - ieeexplore.ieee.org
Smart cities are expected to improve the quality of daily life, promote sustainable
development, and improve the functionality of urban systems. Now that many smart systems …

Cybersecurity in process control, operations, and supply chain

S Parker, Z Wu, PD Christofides - Computers & Chemical Engineering, 2023 - Elsevier
With the integration of computation, networking, and physical process components to
seamlessly combine hardware and software resources to improve process efficiency …

[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology

M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

Harnessing artificial intelligence capabilities to improve cybersecurity

S Zeadally, E Adi, Z Baig, IA Khan - Ieee Access, 2020 - ieeexplore.ieee.org
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …

[HTML][HTML] Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

Y Shen, S Shen, Q Li, H Zhou, Z Wu, Y Qu - Digital Communications and …, 2023 - Elsevier
The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive
volumes of data explosion. The generated data is collected and shared using edge-based …

A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy

J Pawlick, E Colbert, Q Zhu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …

Game theory for multi-access edge computing: Survey, use cases, and future trends

J Moura, D Hutchison - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Game theory (GT) has been used with significant success to formulate, and either design or
optimize, the operation of many representative communications and networking scenarios …

[HTML][HTML] Industrial cyber-physical systems protection: A methodological review

R Canonico, G Sperlì - Computers & Security, 2023 - Elsevier
Ubiquitous utilization of Information and Communication Technologies in modern
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …

Intrusion response systems for cyber-physical systems: A comprehensive survey

M Bashendy, A Tantawy, A Erradi - Computers & Security, 2023 - Elsevier
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …