Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

FPGA implementations for data encryption and decryption via concurrent and parallel computation: A review

AA Yazdeen, SRM Zeebaree… - Qubahan Academic …, 2021 - journal.qubahan.com
In recent days, increasing numbers of Internet and wireless network users have helped
accelerate the need for encryption mechanisms and devices to protect user data sharing …

Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects

AR Javed, F Shahzad, S ur Rehman, YB Zikria… - Cities, 2022 - Elsevier
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …

Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks

M Snehi, A Bhandari - Computer Science Review, 2021 - Elsevier
The wide dispersion of the Internet of Things (IoT), Software-defined Networks and Cloud
Computing have given the wings to Cyber–Physical System adoption. The newfangled …

LoRaWAN security survey: Issues, threats and possible mitigation techniques

H Noura, T Hatoum, O Salman, JP Yaacoub, A Chehab - Internet of Things, 2020 - Elsevier
With the emergence of IoT, new communication technologies have been proposed to cope
with the IoT large scale, and the” things” constraints in terms of power and processing …

[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm

V Kampourakis, V Gkioulos, S Katsikas - Computers & Security, 2023 - Elsevier
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

Cyber-physical systems research and education in 2030: Scenarios and strategies

DG Broo, U Boman, M Törngren - Journal of Industrial Information …, 2021 - Elsevier
Future cyber-physical systems (CPS), such as smart cities, collaborative robots, autonomous
vehicles or intelligent transport systems, are expected to be highly intelligent, electrified, and …

Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining

D Dhinakaran, PMJ Prathap - The Journal of Supercomputing, 2022 - Springer
The confidential data is mainly managed by creating passwords, tokens, and unique
identifiers in an authorized manner. These records must be kept in a safe location away from …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …