[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

[HTML][HTML] Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges

M Benmalek - Internet of Things and Cyber-Physical Systems, 2024 - Elsevier
Ransomware attacks have emerged as one of the most significant cyberthreats faced by
organizations worldwide. In recent years, ransomware has also started to target critical …

Securing the digital supply chain cyber threats and vulnerabilities

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Measures for Logistics …, 2024 - igi-global.com
The digital supply chain has become an integral part of modern business operations,
enabling efficient and streamlined processes. However, with the rapid advancement of …

Safeguarding the future: A comprehensive analysis of security measures for smart grids

SA Wasumwa - World Journal of Advanced Research and Reviews, 2023 - wjarr.com
With the rapid advancement of technology and the growing reliance on renewable energy
sources, smart grids have emerged as a transformative solution for enhancing the efficiency …

CGAAD: Centrality-and Graph-Aware Deep Learning Model for Detecting Cyberattacks Targeting Industrial Control Systems in Critical Infrastructure

TNI Alrumaih, MJF Alenazi - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Industrial control systems (ICSs) are crucial in managing critical infrastructure, making their
security a paramount concern. In recent years, their widespread adoption, together with the …

Enhancing security in islanded AC microgrid: Detecting and mitigating FDI attacks in secondary consensus control through AI-based method

MA Taher, M Tariq, AI Sarwat - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
This paper presents a successfully developed secondary consensus control system to
ensure accurate voltage regulation among distributed generators in an islanded AC …

BWM Integrated VIKOR method using Neutrosophic fuzzy sets for cybersecurity risk assessment of connected and autonomous vehicles

BA Tanaji, S Roychowdhury - Applied Soft Computing, 2024 - Elsevier
Connected and autonomous vehicles (CAVs) have gained significant importance in
intelligent transportation systems. However, CAVs are associated with significant cyber-risks …

[HTML][HTML] Human factors and cyber-security risks on the railway–the critical role played by signalling operations

E Thron, S Faily, H Dogan, M Freer - Information & Computer Security, 2024 - emerald.com
Purpose Railways are a well-known example of complex critical infrastructure, incorporating
socio-technical systems with humans such as drivers, signallers, maintainers and …

[HTML][HTML] Water Supply Security—Risk Management Instruments in Water Supply Companies

F Heumer, T Grischek, J Tränckner - Water, 2024 - mdpi.com
Piped drinking water supplies are exposed to a range of threats. Changing hazard situations
arise from climate change, digitisation, and changing conditions in the power supply, among …

Firmware Updates over the Air via LoRa: Unicast and Broadcast Combination for Boosting Update Speed

V Malumbres, J Saldana, G Berné, J Modrego - Sensors, 2024 - mdpi.com
The capacity to update firmware is a vital component in the lifecycle of Internet of Things
(IoT) devices, even those with restricted hardware resources. This paper explores the best …