An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space
G Kavallieratos, S Katsikas - International Journal of Critical Infrastructure …, 2023 - Elsevier
Nowadays, assets in space are vital for the provision of critical societal functions such as
transportation, communication, production and supply of food, agriculture, etc. The …
transportation, communication, production and supply of food, agriculture, etc. The …
[HTML][HTML] Smart Agricultural–Industrial Crop-Monitoring System Using Unmanned Aerial Vehicle–Internet of Things Classification Techniques
Unmanned aerial vehicles (UAVs) coupled with machine learning approaches have
attracted considerable interest from academicians and industrialists. UAVs provide the …
attracted considerable interest from academicians and industrialists. UAVs provide the …
The convergence of artificial intelligence and blockchain: the state of play and the road ahead
D Bhumichai, C Smiliotopoulos, R Benton… - Information, 2024 - mdpi.com
Artificial intelligence (AI) and blockchain technology have emerged as increasingly
prevalent and influential elements shaping global trends in Information and …
prevalent and influential elements shaping global trends in Information and …
[HTML][HTML] Detecting lateral movement: A systematic survey
Within both the cyber kill chain and MITRE ATT&CK frameworks, Lateral Movement (LM) is
defined as any activity that allows adversaries to progressively move deeper into a system in …
defined as any activity that allows adversaries to progressively move deeper into a system in …
Pengetahuan Dasar Identifikasi Dini Deteksi Serangan Kejahatan Siber Untuk Mencegah Pembobolan Data Perusahaan
TG Laksana, S Mulyani - Jurnal Ilmiah Multidisiplin, 2024 - journal.admi.or.id
Saat ini, keamanan siber menjadi semakin penting dalam dunia digital. Dengan serangan
kejahatan siber yang meningkat, penting bagi individu dan bisnis untuk memahami dan …
kejahatan siber yang meningkat, penting bagi individu dan bisnis untuk memahami dan …
Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks
Network intrusion detection systems (NIDS) play a pivotal role in safeguarding critical digital
infrastructures against cyber threats. Machine learning-based detection models applied in …
infrastructures against cyber threats. Machine learning-based detection models applied in …
StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications
Rigorous testing methods are essential for ensuring the security and reliability of industrial
controller software. Fuzzing, a technique that automatically discovers software bugs, has …
controller software. Fuzzing, a technique that automatically discovers software bugs, has …
[HTML][HTML] Formal Security Analysis of ISA100. 11a Standard Protocol Based on Colored Petri Net Tool
T Feng, T Chen, X Gong - Information, 2024 - mdpi.com
This paper presents a formal security analysis of the ISA100. 11a standard protocol using
the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model …
the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model …
AI Evolution in Industry 4.0 and Industry 5.0: An Experimental Comparative Assessment
E Dmitrieva, V Balmiki, S Lakhanpal… - BIO Web of …, 2024 - bio-conferences.org
This paper provides a thorough analysis of the development of artificial intelligence (AI) in
the context of Industry 4.0 and the soon-to-be Industry 5.0. Important conclusions come from …
the context of Industry 4.0 and the soon-to-be Industry 5.0. Important conclusions come from …
SACF: An Innovative and Secure Architectural Approach for Cybersecurity using Fog Computing Environments
M Kaur, R Aron, S Seth - 2023 9th International Conference …, 2023 - ieeexplore.ieee.org
The significance of cybersecurity cannot be emphasised in a society that is becoming more
linked. Unprecedented levels of efficiency and convenience have been made possible by …
linked. Unprecedented levels of efficiency and convenience have been made possible by …