A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

The IoT and the new EU cybersecurity regulatory landscape

PG Chiara - International Review of Law, Computers & Technology, 2022 - Taylor & Francis
This article aims to cast light on how the fast-evolving European cybersecurity regulatory
framework would impact the Internet of Things (IoT) domain. The legal analysis investigates …

Dependency-based security risk assessment for cyber-physical systems

A Akbarzadeh, SK Katsikas - International Journal of Information Security, 2023 - Springer
A cyber-physical attack is a security breach in cyber space that impacts on the physical
environment. The number and diversity of such attacks against Cyber-Physical Systems …

Explainable artificial intelligence (xai) approaches and deep meta-learning models for cyber-physical systems

E Daglarli - Artificial Intelligence Paradigms for Smart Cyber …, 2021 - igi-global.com
Today, the effects of promising technologies such as explainable artificial intelligence (xAI)
and meta-learning (ML) on the internet of things (IoT) and the cyber-physical systems (CPS) …

On the stability of cyber-physical control systems with sensor multiplicative attacks

LF Cómbita, N Quijano, ÁA Cárdenas - IEEE Access, 2022 - ieeexplore.ieee.org
To understand the impact of cyber-attacks to sensors in control systems, we present a
stability analysis of a wide range of systems in this paper. Based on Lyapunov stability …

Intrusion Detection and Prevention in Industrial Internet of Things: A Study

N Jeffrey, Q Tan, JR Villar - … Intelligence in Security for Information Systems …, 2023 - Springer
Abstract The Industrial Internet of Things (IIoT) brings the ubiquitous connectivity of the
Internet of Things (IoT) to industrial processes, optimizing manufacturing and civil …

[HTML][HTML] Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience

N Basheer, S Islam, MKS Alwaheidi, S Papastergiou - Sensors, 2024 - mdpi.com
System-to-system communication via Application Programming Interfaces (APIs) plays a
pivotal role in the seamless interaction among software applications and systems for efficient …

Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation

A Akbarzadeh, L Erdodi, SH Houmb… - International Journal of …, 2024 - Springer
Abstract Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a
specific target. Often described as' low and slow', APTs remain undetected until the …

Deception-Resistant Stochastic Manufacturing for Automated Production Lines

Z Yang, H Pu, L He, C Yao, J Zhou, P Cheng… - Proceedings of the 27th …, 2024 - dl.acm.org
The advancement of Industrial Internet-of-Things (IIoT) magnifies the cyber risk of automated
production lines, especially to deception attacks that tamper with the monitoring data to …

A roadmap towards robust IoT-enabled cyber-physical systems in cyber industrial 4.0

MP Devi, MD Choudhry, GB Raja… - Handbook of Research of …, 2022 - taylorfrancis.com
Internet of things (IoT) provides an escalation to the Industry 4.0 by relating human beings,
data, and different types of process it carries phenomenal profits. However, In the IoT …