Search
Search Results
-
Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security
Successful cyber attacks against industrial systems, such as water treatment systems, can lead to irreparable consequences for public health and the...
-
Toward an Improved Security Performance of Industrial Internet of Things Systems
The Internet of Things (IoT) has evolved to the point that modern enterprises may now deploy large-scale IoT ecosystems, such as the Industrial...
-
Task offloading for edge computing in industrial Internet with joint data compression and security protection
With the increase of intelligent devices in the industrial Internet, the computing tasks of these devices are growing exponentially. However, due to...
-
A threat recognition solution of edge data security in industrial internet
Edge computing, as a computing model closer to industrial data sources, has gradually become the focus of industrial Internet. The edge computing of...
-
Machine learning methods for the industrial robotic systems security
The trends in the introduction of industrial and logistics robots into the social sphere of activity in order to ensure the safety of civilian...
-
Tracing security requirements in industrial control systems using graph databases
We must explicitly capture relationships and hierarchies between the multitude of system and security standards requirements. Current security...
-
A Taxonomy of Vulnerabilities, Attacks, and Security Solutions in Industrial PLCs
In recent years, industrial control systems have been extensively utilized across critical industries, encompassing manufacturing, automation, and... -
Using Security-through-Obscurity Principle in an Industrial Internet of Things
AbstractConsidering the openness of industrial Internet-of-Things systems as compared with conventional SCADA-like systems, the provision of...
-
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control...
-
Difficulties and Solutions for Industrial Data Security and Compliance Governance
With the rapid development of emerging digital technologies such as big data, 5G and cloud computing, a technological pedestal has been built for... -
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...
-
A blockchain-based security system with light cryptography for user authentication security
Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology,...
-
Unboxing fog security: a review of fog security and authentication mechanisms
Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible...
-
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models...
-
Dynamic vulnerability severity calculator for industrial control systems
The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However,...
-
DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT
The advancement of 5G technology has enabled the IIoT (Industrial Internet of Things) to integrate artificial intelligence, cloud computing, and edge...
-
Optimized Bi-LSTM: a novel approach for attack detection in industrial IoT
The Industrial Internet of Things (IIoT) plays an important role as its implementation requires scalable and secure methods. IIoT integrates...
-
A systematic map** study on security for systems of systems
In the late twentieth century, the term “System of Systems” (SoS) became popular to describe a complex system made up of a combination of independent...
-
Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT
With the development of the unmanned aerial vehicle (UAV), UAV is widely used in various fields, such as Industrial IoT. Usually , the communication...
-
CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems
The rise of digital twin-based operational improvements poses a challenge to protecting industrial cyber-physical systems. It is crucial to safeguard...