We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 1,103 results
  1. A review of digital twins and their application in cybersecurity based on artificial intelligence

    The potential of digital twin technology is yet to be fully realised due to its diversity and untapped potential. Digital twins enable systems’...

    Mohammadhossein Homaei, Óscar Mogollón-Gutiérrez, ... Andrés Caro in Artificial Intelligence Review
    Article Open access 10 July 2024
  2. Data Security as a Top Priority in the Digital World: Preserve Data Value by Being Proactive and Thinking Security First

    Today, large amounts of data are being continuously produced, collected, and exchanged between systems. As the number of devices, systems and data...
    Anastasija Nikiforova in Research and Innovation Forum 2022
    Conference paper 2023
  3. Impact of Artificial Intelligence on Enterprise Information Security Management in the Context of ISO 27001 and 27002: A Tertiary Systematic Review and Comparative Analysis

    The use of Artificial Intelligence (AI) by enterprises has dramatically increased over the last decade and is estimated to accelerate further. This...
    Heiko Kreutz, Hamid Jahankhani in Cybersecurity and Artificial Intelligence
    Chapter 2024
  4. Decision-Making Support for Data Integration in Cyber-Physical-System Architectures

    Cyber-Physical Systems (CPS) design is a complex challenge involving physical and digital components working together to accomplish a specific goal....
    Evangelos Ntentos, Amirali Amiri, ... Uwe Zdun in Service-Oriented Computing
    Conference paper 2023
  5. A Comprehensive Survey on Cyber-Physical Systems Towards Healthcare 4.0

    Cyber-physical systems (CPS) are life-critical, complex systems that are formed by the in-depth integration of communication, computation, and...

    Aditya Gupta, Amritpal Singh in SN Computer Science
    Article 08 February 2023
  6. Safety, Security, and Risk

    The main properties of trustworthy cyber-physical systems are safety and security. Both safety and security are the results of careful, responsible,...
    Chapter 2022
  7. Students health physique information sharing in publicly collaborative services over edge-cloud networks

    Data privacy is playing a vital role while facing the digital life aspects. Today, the world is being extensively inter-connected through the...

    ** Liu, Dai Shi, ... **ang Liu in Journal of Cloud Computing
    Article Open access 09 May 2024
  8. An integrated cyber security risk management framework and risk predication for the critical infrastructure protection

    Cyber security risk management plays an important role for today’s businesses due to the rapidly changing threat landscape and the existence of...

    Halima Ibrahim Kure, Shareeful Islam, Haralambos Mouratidis in Neural Computing and Applications
    Article 02 February 2022
  9. Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals

    The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets. The...

    Antonio Santos-Olmo, Luis Enrique Sánchez, ... Eduardo Fernández-Medina in Frontiers of Computer Science
    Article Open access 25 November 2023
  10. Principles for Security

    Security principles form the foundation for the creation and operation of security-critical cyber-physical systems. They have their roots in...
    Chapter 2022
  11. Access Control Models and Architectures For IoT and Cyber Physical Systems

    This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual,...

    Maanak Gupta, Smriti Bhatt, ... Ravi Sandhu
    Book 2022
  12. A review study on blockchain-based IoT security and forensics

    The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The...

    Randa Kamal, Ezz El-Din Hemdan, Nawal El-Fishway in Multimedia Tools and Applications
    Article 01 September 2021
  13. A hybrid machine learning model for detecting cybersecurity threats in IoT applications

    The introduction of the Internet of Things has led to the connectivity of millions of devices with less human interaction. This demand in...

    Midighe Usoh, Philip Asuquo, ... Udoinyang Inyang in International Journal of Information Technology
    Article 19 July 2023
  14. SMarT: A SMT Based Privacy Preserving Smart Meter Streaming Methodology

    Smart metering is a mechanism through which fine-grained power consumption profiles of the consumers are collected periodically in a Smart grid....
    Soumyadyuti Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2022
  15. Exploring contactless techniques in multimodal emotion recognition: insights into diverse applications, challenges, solutions, and prospects

    In recent years, emotion recognition has received significant attention, presenting a plethora of opportunities for application in diverse fields...

    Umair Ali Khan, Qianru Xu, ... Janne Kauttonen in Multimedia Systems
    Article Open access 06 April 2024
  16. A secure and improved two factor authentication scheme using elliptic curve and bilinear pairing for cyber physical systems

    In order to equip the technical fraternity with smart technologies, the past few years have witnessed increasing usage of Cyber-Physical Systems...

    Aritro Sengupta, Amit Singh, ... Tapobrata Dhar in Multimedia Tools and Applications
    Article 06 May 2022
  17. Secure data sharing with blockchain for remote health monitoring applications: a review

    Remote Health Monitoring (RHM) is going to reinvent the future healthcare industry and bring about abundant value to hospitals, doctors, and patients...

    Venkatesh Upadrista, Sajid Nazir, Huaglory Tianfield in Journal of Reliable Intelligent Environments
    Article Open access 11 May 2023
  18. Exploration of Ensemble Methods for Cyber Attack Detection in Cyber-Physical Systems

    Cyber-physical systems (CPS) are prevalent in critical infrastructure, industrial settings, cybersecurity, healthcare, transportation and more. As...
    Yaa Takyiwaa Acquaah, Roy Kaushik in Artificial Intelligence Applications and Innovations
    Conference paper 2024
  19. Toward the Adoption of Secure Cyber Digital Twins to Enhance Cyber-Physical Systems Security

    Cyber-Physical Systems (CPSs) and Digital Twins (DTs) currently represent the two most notable examples of cyber-physical integration enabled by...
    Alessandra De Benedictis, Christiancarmine Esposito, Alessandra Somma in Quality of Information and Communications Technology
    Conference paper 2022
  20. A lightweight blockchain-based framework for medical cyber-physical system

    A medical cyber-physical system (MCPS) combines intelligent medical devices with a network. Nowadays, MCPS is extensively used in the healthcare...

    Ashish Kumar, Kakali Chatterjee in The Journal of Supercomputing
    Article 06 March 2023
Did you find what you were looking for? Share feedback.