We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security

    Successful cyber attacks against industrial systems, such as water treatment systems, can lead to irreparable consequences for public health and the...

    Evgenia Novikova, Elena Fedorchenko, ... Igor Saenko in SN Computer Science
    Article 29 March 2024
  2. Toward an Improved Security Performance of Industrial Internet of Things Systems

    The Internet of Things (IoT) has evolved to the point that modern enterprises may now deploy large-scale IoT ecosystems, such as the Industrial...

    Salma Elhag, Amal Mahmoud Alghamdi, Norah Ahmad Al-Shomrani in SN Computer Science
    Article 28 December 2022
  3. Task offloading for edge computing in industrial Internet with joint data compression and security protection

    With the increase of intelligent devices in the industrial Internet, the computing tasks of these devices are growing exponentially. However, due to...

    Zhongmin Wang, Yurong Ding, ... Cong Gao in The Journal of Supercomputing
    Article 26 September 2022
  4. A threat recognition solution of edge data security in industrial internet

    Edge computing, as a computing model closer to industrial data sources, has gradually become the focus of industrial Internet. The edge computing of...

    Qianmu Li, Huaqiu Long, ... Junhui Cai in World Wide Web
    Article 21 April 2022
  5. Machine learning methods for the industrial robotic systems security

    The trends in the introduction of industrial and logistics robots into the social sphere of activity in order to ensure the safety of civilian...

    Dmitry Tsapin, Kirill Pitelinskiy, ... Sergey Gataullin in Journal of Computer Virology and Hacking Techniques
    Article 02 September 2023
  6. Tracing security requirements in industrial control systems using graph databases

    We must explicitly capture relationships and hierarchies between the multitude of system and security standards requirements. Current security...

    Awais Tanveer, Chandan Sharma, ... Matthew M. Y. Kuo in Software and Systems Modeling
    Article Open access 12 July 2022
  7. A Taxonomy of Vulnerabilities, Attacks, and Security Solutions in Industrial PLCs

    In recent years, industrial control systems have been extensively utilized across critical industries, encompassing manufacturing, automation, and...
    Eduard Paul Enoiu, Kejsi Biçoku, ... Michael Felderer in CyberSecurity in a DevOps Environment
    Chapter 2024
  8. Using Security-through-Obscurity Principle in an Industrial Internet of Things

    Abstract

    Considering the openness of industrial Internet-of-Things systems as compared with conventional SCADA-like systems, the provision of...

    A. D. Dakhnovich, D. A. Moskvin, D. P. Zegzhda in Automatic Control and Computer Sciences
    Article 01 December 2021
  9. Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges

    The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control...

    Abigail M. Y. Koay, Ryan K. L Ko, ... Kenneth Radke in Journal of Intelligent Information Systems
    Article Open access 12 October 2022
  10. Difficulties and Solutions for Industrial Data Security and Compliance Governance

    With the rapid development of emerging digital technologies such as big data, 5G and cloud computing, a technological pedestal has been built for...
    Conference paper 2024
  11. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

    The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...

    Shitharth Selvarajan, Gautam Srivastava, ... Jerry Chun-Wei Lin in Journal of Cloud Computing
    Article Open access 16 March 2023
  12. A blockchain-based security system with light cryptography for user authentication security

    Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology,...

    Imen Hagui, Amina Msolli, ... Fredj Hassen in Multimedia Tools and Applications
    Article 13 November 2023
  13. Unboxing fog security: a review of fog security and authentication mechanisms

    Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible...

    Neha Kaliya, Digambar Pawar in Computing
    Article 15 August 2023
  14. Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials

    Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models...

    Junli Fang, Tao Feng, ... Ye Lu in Journal of Cloud Computing
    Article Open access 02 February 2024
  15. Dynamic vulnerability severity calculator for industrial control systems

    The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However,...

    Pavlos Cheimonidis, Konstantinos Rantos in International Journal of Information Security
    Article 08 May 2024
  16. DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT

    The advancement of 5G technology has enabled the IIoT (Industrial Internet of Things) to integrate artificial intelligence, cloud computing, and edge...

    Anjali Rajak, Rakesh Tripathi in International Journal of Information Technology
    Article 18 December 2023
  17. Optimized Bi-LSTM: a novel approach for attack detection in industrial IoT

    The Industrial Internet of Things (IIoT) plays an important role as its implementation requires scalable and secure methods. IIoT integrates...

    Madini O. Alassafi, Syed Humaid Hasan, ... Syed Hamid Hasan in Signal, Image and Video Processing
    Article 03 May 2024
  18. A systematic map** study on security for systems of systems

    In the late twentieth century, the term “System of Systems” (SoS) became popular to describe a complex system made up of a combination of independent...

    Miguel Angel Olivero, Antonia Bertolino, ... Ilaria Matteucci in International Journal of Information Security
    Article Open access 18 October 2023
  19. Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT

    With the development of the unmanned aerial vehicle (UAV), UAV is widely used in various fields, such as Industrial IoT. Usually , the communication...

    **nzhong Liu, Cong **e, ... Zhihe Yang in The Journal of Supercomputing
    Article 07 October 2021
  20. CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems

    The rise of digital twin-based operational improvements poses a challenge to protecting industrial cyber-physical systems. It is crucial to safeguard...

    S. Krishnaveni, Thomas M. Chen, ... B. Amutha in Cluster Computing
    Article 20 March 2024
Did you find what you were looking for? Share feedback.