An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space

G Kavallieratos, S Katsikas - International Journal of Critical Infrastructure …, 2023 - Elsevier
Nowadays, assets in space are vital for the provision of critical societal functions such as
transportation, communication, production and supply of food, agriculture, etc. The …

[HTML][HTML] Smart Agricultural–Industrial Crop-Monitoring System Using Unmanned Aerial Vehicle–Internet of Things Classification Techniques

K Vijayalakshmi, S Al-Otaibi, L Arya, MA Almaiah… - Sustainability, 2023 - mdpi.com
Unmanned aerial vehicles (UAVs) coupled with machine learning approaches have
attracted considerable interest from academicians and industrialists. UAVs provide the …

The convergence of artificial intelligence and blockchain: the state of play and the road ahead

D Bhumichai, C Smiliotopoulos, R Benton… - Information, 2024 - mdpi.com
Artificial intelligence (AI) and blockchain technology have emerged as increasingly
prevalent and influential elements shaping global trends in Information and …

[HTML][HTML] Detecting lateral movement: A systematic survey

C Smiliotopoulos, G Kambourakis, C Kolias - Heliyon, 2024 - cell.com
Within both the cyber kill chain and MITRE ATT&CK frameworks, Lateral Movement (LM) is
defined as any activity that allows adversaries to progressively move deeper into a system in …

Pengetahuan Dasar Identifikasi Dini Deteksi Serangan Kejahatan Siber Untuk Mencegah Pembobolan Data Perusahaan

TG Laksana, S Mulyani - Jurnal Ilmiah Multidisiplin, 2024 - journal.admi.or.id
Saat ini, keamanan siber menjadi semakin penting dalam dunia digital. Dengan serangan
kejahatan siber yang meningkat, penting bagi individu dan bisnis untuk memahami dan …

Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks

X Zhao, KW Fok, VLL Thing - arXiv preprint arXiv:2404.07464, 2024 - arxiv.org
Network intrusion detection systems (NIDS) play a pivotal role in safeguarding critical digital
infrastructures against cyber threats. Machine learning-based detection models applied in …

StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications

KA Koffi, V Kampourakis, J Song, C Kolias, RC Ivans - Electronics, 2024 - mdpi.com
Rigorous testing methods are essential for ensuring the security and reliability of industrial
controller software. Fuzzing, a technique that automatically discovers software bugs, has …

[HTML][HTML] Formal Security Analysis of ISA100. 11a Standard Protocol Based on Colored Petri Net Tool

T Feng, T Chen, X Gong - Information, 2024 - mdpi.com
This paper presents a formal security analysis of the ISA100. 11a standard protocol using
the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model …

AI Evolution in Industry 4.0 and Industry 5.0: An Experimental Comparative Assessment

E Dmitrieva, V Balmiki, S Lakhanpal… - BIO Web of …, 2024 - bio-conferences.org
This paper provides a thorough analysis of the development of artificial intelligence (AI) in
the context of Industry 4.0 and the soon-to-be Industry 5.0. Important conclusions come from …

SACF: An Innovative and Secure Architectural Approach for Cybersecurity using Fog Computing Environments

M Kaur, R Aron, S Seth - 2023 9th International Conference …, 2023 - ieeexplore.ieee.org
The significance of cybersecurity cannot be emphasised in a society that is becoming more
linked. Unprecedented levels of efficiency and convenience have been made possible by …