Correlation-based anomaly detection in industrial control systems

Z Jadidi, S Pal, M Hussain, K Nguyen Thanh - Sensors, 2023 - mdpi.com
Industrial Control Systems (ICSs) were initially designed to be operated in an isolated
network. However, recently, ICSs have been increasingly connected to the Internet to …

Blockchain meets edge-AI for food supply chain traceability and provenance

V Dedeoglu, S Malik, G Ramachandran, S Pal… - Comprehensive …, 2023 - Elsevier
Food supply chains are increasingly digitised and automated through the use of
technologies such as Internet-of-Things (IoT), blockchain and Artificial Intelligence (AI). Such …

[HTML][HTML] Transfer Fuzzy Learning Enabled Streebog Cryptographic Substitution Permutation Based Zero Trust Security in IIOT

A Singh, RK Dhanaraj, MA Ali, P Balaji… - Alexandria Engineering …, 2023 - Elsevier
The advent of the fourth industrial revolution and connection with devices and sensors
produced extensive arbitrary, discordant data in IIoT platforms. The IIoT platforms have …

Security of machine learning-based anomaly detection in cyber physical systems

Z Jadidi, S Pal, N Nayak, A Selvakkumar… - 2022 International …, 2022 - ieeexplore.ieee.org
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and
applications in the Cyber Physical Systems (CPS), the methods of protecting CPS against …

Industrial IoT (IIOT): Security threats and countermeasures

R Kumar, B Kandpal, V Ahmad - … International Conference on …, 2023 - ieeexplore.ieee.org
IoT makes a system of intelligent machines, objects, people, and/or other things internet
connected, opening them up to major dangers and attacks. Research analysis of IoT …

Public cloud network intrusion and internet legal supervision based on abnormal feature detection

Y Song - Computers and Electrical Engineering, 2023 - Elsevier
The increasing number of public cloud network intrusion incidents poses a serious threat to
internet security. This article provides an effective public cloud network intrusion detection …

A Fog-Based Security Framework for Large-Scale Industrial Internet of Things Environments

H Zhou, S Pal, Z Jadidi, A Jolfaei - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is a developing research area with potential global
Internet connectivity, turning everyday objects into intelligent devices with more autonomous …

TrackInk: An IoT-enabled real-time object tracking system in space

C Aume, K Andrews, S Pal, A James, A Seth… - Sensors, 2022 - mdpi.com
Nowadays, there is tremendous growth in the Internet of Things (IoT) applications in our
everyday lives. The proliferation of smart devices, sensors technology, and the Internet …

Recent privacy and security issues in internet of things network layer: a systematic review

MZ Alam, F Reegu, AA Dar… - … on Sustainable Computing …, 2022 - ieeexplore.ieee.org
Described as the Internet of Things, this pioneering breakthrough links everything from
sensors to automobiles to hospitals to businesses and customers all over the world through …

Joint IoT/ML platforms for smart societies and environments: a review on multimodal information-based learning for safety and security

H Attar - ACM Journal of Data and Information Quality, 2023 - dl.acm.org
The application of the Internet of Things (IoT) is highly expected to have comprehensive
economic, business, and societal implications for our smart lives; indeed, IoT technologies …