A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city

MHP Rizi, SAH Seno - Internet of Things, 2022 - Elsevier
The development of smart cities through digital communications has improved citizens'
quality of life and well-being. In these cities, IoT technology generates vast amounts of data …

Machine learning for detecting data exfiltration: A review

B Sabir, F Ullah, MA Babar, R Gaire - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Context: Research at the intersection of cybersecurity, Machine Learning (ML), and Software
Engineering (SE) has recently taken significant steps in proposing countermeasures for …

TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning

P Kumar, GP Gupta, R Tripathi - Journal of Systems Architecture, 2021 - Elsevier
With the advancement in sensor technology and the proliferation of low-cost electronic
circuits, Internet of Things (IoT) is emerging as a promising technology for realization of …

Block-VN: A distributed blockchain based vehicular network architecture in smart city

PK Sharma, SY Moon, JH Park - Journal of information processing …, 2017 - koreascience.kr
In recent decades, the ad hoc network for vehicles has been a core network technology to
provide comfort and security to drivers in vehicle environments. However, emerging …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

[HTML][HTML] Securing IoT and SDN systems using deep-learning based automatic intrusion detection

RA Elsayed, RA Hamada, MI Abdalla… - Ain Shams Engineering …, 2023 - Elsevier
Abstract Both Internet of Things (IoT) and Software Defined Networks (SDN) have a major
role in increasing efficiency and productivity for smart cities. Despite that, they face potential …

Attention based multi-agent intrusion detection systems using reinforcement learning

K Sethi, YV Madhav, R Kumar, P Bera - Journal of Information Security and …, 2021 - Elsevier
Designing an effective network intrusion system (IDS) is a challenging problem because of
the emergence of a large number of novel attacks and heterogeneous network applications …

TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data

J Zhao, Q Yan, J Li, M Shao, Z He, B Li - Computers & Security, 2020 - Elsevier
Security organizations increasingly rely on Cyber Threat Intelligence (CTI) sharing to
enhance resilience against cyber threats. However, its effectiveness remains dubious due to …

Current cyber-defense trends in industrial control systems

JE Rubio, C Alcaraz, R Roman, J Lopez - Computers & Security, 2019 - Elsevier
Abstract Advanced Persistent Threats (APTs) have become a serious hazard for any critical
infrastructure, as a single solution to protect all industrial assets from these complex attacks …

Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning

S Wang, Z Wang, T Zhou, H Sun, X Yin… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Host-based threats such as Program Attack, Malware Implantation, and Advanced Persistent
Threats (APT), are commonly adopted by modern attackers. Recent studies propose …