Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats

Z Chen, J Liu, Y Shen, M Simsek, B Kantarci… - ACM Computing …, 2022 - dl.acm.org
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …

[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2023 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …

Internet of drones security and privacy issues: Taxonomy and open challenges

M Yahuza, MYI Idris, IB Ahmedy, AWA Wahab… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is a decentralized network and management framework that links
drones' access to the controlled airspace and provides inter-location navigation services …

On the security of containers: Threat modeling, attack analysis, and mitigation strategies

AY Wong, EG Chekole, M Ochoa, J Zhou - Computers & Security, 2023 - Elsevier
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …

A study on content tampering in multimedia watermarking

AK Sahu, K Umachandran, VD Biradar, O Comfort… - SN Computer …, 2023 - Springer
Technological progresses offer more occasions for tampering outbreaks. Lithography
services at affordable prices, in aggregation with open software tools to influence changes in …

Cyber security challenges in aviation communication, navigation, and surveillance

G Dave, G Choudhary, V Sihag, I You, KKR Choo - Computers & Security, 2022 - Elsevier
As the aviation sector becomes digitized and increasingly reliant on wireless technology, so
has its attractiveness to cyber attackers including nation-state actors and terrorists. For …

Cyber security perspectives in public spaces: drone case study

W Shafik - Handbook of research on cybersecurity risk in …, 2023 - igi-global.com
As the public use drones (aircraft that can operate semi or autonomous), sometimes referred
to as unmanned aerial vehicles or automotive aircrafts, to ease daily people's lifestyles …

A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment

A AlSabeh, J Khoury, E Kfoury, J Crichigno… - Computer …, 2022 - Elsevier
The emergence of the IoT, cloud systems, data centers, and 5G networks is increasing the
demand for a rapid development of new applications and protocols at all levels of the …

Network intrusion detection and comparative analysis using ensemble machine learning and feature selection

S Das, S Saha, AT Priyoti, EK Roy… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Proper security solutions in the cyber world are crucial for enforcing network security by
providing real-time network protection against network vulnerabilities and data exploitation …

[HTML][HTML] Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls

S Zahid, MS Mazhar, SG Abbas, Z Hanif, S Hina… - Internet of Things, 2023 - Elsevier
Industrial automation technologies are envisioned as multi-device systems that are
constantly interacting with one another and with enterprise systems. In these industrial …