Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
FPGA implementations for data encryption and decryption via concurrent and parallel computation: A review
AA Yazdeen, SRM Zeebaree… - Qubahan Academic …, 2021 - journal.qubahan.com
In recent days, increasing numbers of Internet and wireless network users have helped
accelerate the need for encryption mechanisms and devices to protect user data sharing …
accelerate the need for encryption mechanisms and devices to protect user data sharing …
Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …
and communication advancements will empower better administration of accessible …
Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks
M Snehi, A Bhandari - Computer Science Review, 2021 - Elsevier
The wide dispersion of the Internet of Things (IoT), Software-defined Networks and Cloud
Computing have given the wings to Cyber–Physical System adoption. The newfangled …
Computing have given the wings to Cyber–Physical System adoption. The newfangled …
LoRaWAN security survey: Issues, threats and possible mitigation techniques
With the emergence of IoT, new communication technologies have been proposed to cope
with the IoT large scale, and the” things” constraints in terms of power and processing …
with the IoT large scale, and the” things” constraints in terms of power and processing …
[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …
convergence of formerly barricaded operational technology systems with modern …
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …
This resulted into both human and financial losses at all IoT levels especially individual and …
Cyber-physical systems research and education in 2030: Scenarios and strategies
DG Broo, U Boman, M Törngren - Journal of Industrial Information …, 2021 - Elsevier
Future cyber-physical systems (CPS), such as smart cities, collaborative robots, autonomous
vehicles or intelligent transport systems, are expected to be highly intelligent, electrified, and …
vehicles or intelligent transport systems, are expected to be highly intelligent, electrified, and …
Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining
D Dhinakaran, PMJ Prathap - The Journal of Supercomputing, 2022 - Springer
The confidential data is mainly managed by creating passwords, tokens, and unique
identifiers in an authorized manner. These records must be kept in a safe location away from …
identifiers in an authorized manner. These records must be kept in a safe location away from …
[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …