[HTML][HTML] Towards resilient vital infrastructure systems–challenges, opportunities, and future research agenda
… –ecological–technical systems. In addition, we define resilient infrastructures as systems with
ability … But this proposal has its own disadvantages, since such a monitoring system affects …
ability … But this proposal has its own disadvantages, since such a monitoring system affects …
A survey on resilience in the iot: Taxonomy, classification, and discussion of resilience mechanisms
… ]: trustworthiness resilience encompasses common security … IoT infrastructures, namely
sensor landscape (device level), … is the design of a resilient monitoring system and control loop …
sensor landscape (device level), … is the design of a resilient monitoring system and control loop …
[HTML][HTML] Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure
… learning techniques, can be leveraged to significantly contribute to the cyber security of
critical cyber infrastructure through the emergence of more resilient, robust and reliable models. …
critical cyber infrastructure through the emergence of more resilient, robust and reliable models. …
A secure and reliable device access control scheme for IoT based sensor cloud systems
… through discussion on attack resilience is provided. The iLACKA… by high computing
infrastructures like cloud computing to … for wearable healthcare monitoring system. IEEE Trans. …
infrastructures like cloud computing to … for wearable healthcare monitoring system. IEEE Trans. …
An attack-resilient architecture for the Internet of Things
HMJ Almohri, LT Watson… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… -resilient IoT architecture, a trusted controller machine acts as a proxy to capture all device
… to gain access to critical IoT infrastructure, the surveillance cameras, to inject false data and …
… to gain access to critical IoT infrastructure, the surveillance cameras, to inject false data and …
ResIoT: An IoT social framework resilient to malicious activities
… systems (ie, honest and malicious), with an accuracy of not less than 11% compared to the
best competitor tested and highlighting a high resilience … network infrastructures composed of …
best competitor tested and highlighting a high resilience … network infrastructures composed of …
Secure Internet of Things (IoT)-based smart-world critical infrastructures: Survey, case study and research opportunities
… on the design of resilient IoT-based systems, optimal IoTbased system configurations, effective
… Lu, “Holistic cyberphysical management for dependable wireless control systems,” ACM …
… Lu, “Holistic cyberphysical management for dependable wireless control systems,” ACM …
Metrics and enhancement strategies for grid resilience and reliability during natural disasters
… Two novel terminologies named resilience risk factor and grid infrastructure density are …
Electricity grids are expected to be both resilient and reliable. Reliability of the grid is …
Electricity grids are expected to be both resilient and reliable. Reliability of the grid is …
Cascading failures in internet of things: review and perspectives on reliability and resilience
L Xing - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… a resilient system is not necessarily reliable and a reliable system is not necessarily resilient;
as long as a system can … significantly to the resilient design of the large-scale infrastructure. …
as long as a system can … significantly to the resilient design of the large-scale infrastructure. …
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud Computing with Techniques to Implement Security Solutions
VV Vegesna - Asian Journal of Applied Science and Technology …, 2022 - papers.ssrn.com
… Every compromise in this cloud infrastructure could disclose all … is exceptionally effective and
resistant to failure, malware … of data in the system that must originate from a reliable source. …
resistant to failure, malware … of data in the system that must originate from a reliable source. …