Security and privacy in smart cities: Challenges and opportunities
Smart cities are expected to improve the quality of daily life, promote sustainable
development, and improve the functionality of urban systems. Now that many smart systems …
development, and improve the functionality of urban systems. Now that many smart systems …
Cybersecurity in process control, operations, and supply chain
With the integration of computation, networking, and physical process components to
seamlessly combine hardware and software resources to improve process efficiency …
seamlessly combine hardware and software resources to improve process efficiency …
[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology
M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …
sharing about cyber-threats between different organizations has the potential to maximize …
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems
S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …
requests to gather private data from an edge-computing-based IoT cloud storage system …
Harnessing artificial intelligence capabilities to improve cybersecurity
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …
[HTML][HTML] Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes
The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive
volumes of data explosion. The generated data is collected and shared using edge-based …
volumes of data explosion. The generated data is collected and shared using edge-based …
A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
Game theory for multi-access edge computing: Survey, use cases, and future trends
Game theory (GT) has been used with significant success to formulate, and either design or
optimize, the operation of many representative communications and networking scenarios …
optimize, the operation of many representative communications and networking scenarios …
[HTML][HTML] Industrial cyber-physical systems protection: A methodological review
Ubiquitous utilization of Information and Communication Technologies in modern
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …
Intrusion response systems for cyber-physical systems: A comprehensive survey
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …
increased networked connectivity and may cause costly environmental hazards as well as …