Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …
Internet of drones security and privacy issues: Taxonomy and open challenges
Internet of Drones (IoD) is a decentralized network and management framework that links
drones' access to the controlled airspace and provides inter-location navigation services …
drones' access to the controlled airspace and provides inter-location navigation services …
On the security of containers: Threat modeling, attack analysis, and mitigation strategies
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
A study on content tampering in multimedia watermarking
Technological progresses offer more occasions for tampering outbreaks. Lithography
services at affordable prices, in aggregation with open software tools to influence changes in …
services at affordable prices, in aggregation with open software tools to influence changes in …
Cyber security challenges in aviation communication, navigation, and surveillance
As the aviation sector becomes digitized and increasingly reliant on wireless technology, so
has its attractiveness to cyber attackers including nation-state actors and terrorists. For …
has its attractiveness to cyber attackers including nation-state actors and terrorists. For …
Cyber security perspectives in public spaces: drone case study
W Shafik - Handbook of research on cybersecurity risk in …, 2023 - igi-global.com
As the public use drones (aircraft that can operate semi or autonomous), sometimes referred
to as unmanned aerial vehicles or automotive aircrafts, to ease daily people's lifestyles …
to as unmanned aerial vehicles or automotive aircrafts, to ease daily people's lifestyles …
A survey on security applications of P4 programmable switches and a STRIDE-based vulnerability assessment
The emergence of the IoT, cloud systems, data centers, and 5G networks is increasing the
demand for a rapid development of new applications and protocols at all levels of the …
demand for a rapid development of new applications and protocols at all levels of the …
Network intrusion detection and comparative analysis using ensemble machine learning and feature selection
Proper security solutions in the cyber world are crucial for enforcing network security by
providing real-time network protection against network vulnerabilities and data exploitation …
providing real-time network protection against network vulnerabilities and data exploitation …
[HTML][HTML] Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls
Industrial automation technologies are envisioned as multi-device systems that are
constantly interacting with one another and with enterprise systems. In these industrial …
constantly interacting with one another and with enterprise systems. In these industrial …