Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts
An increasing number of cybersecurity breaches adversely affect business performance, by
leveraging the vulnerabilities of networked manufacturing machines. In some cases, cyber …
leveraging the vulnerabilities of networked manufacturing machines. In some cases, cyber …
Cascading failures in internet of things: review and perspectives on reliability and resilience
L Xing - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
In the Internet of Things (IoT), various devices operate collaboratively in collecting data,
relaying information to one another, and processing information intelligently. Due to …
relaying information to one another, and processing information intelligently. Due to …
Industry 5.0 or industry 4.0 S? Introduction to industry 4.0 and a peek into the prospective industry 5.0 technologies
A Raja Santhi, P Muthuswamy - International Journal on Interactive Design …, 2023 - Springer
Abstract The Industrial Revolution can be termed as the transformation of traditional
industrial practices into new techniques dominated by the technologies available at that …
industrial practices into new techniques dominated by the technologies available at that …
Intrusion detection in IoT networks using deep learning algorithm
The internet has become an inseparable part of human life, and the number of devices
connected to the internet is increasing sharply. In particular, Internet of Things (IoT) devices …
connected to the internet is increasing sharply. In particular, Internet of Things (IoT) devices …
Composite and efficient DDoS attack detection framework for B5G networks
Distributed denial-of-service (DDoS) remains an ever-growing problem that has affected and
continues to affect a host of web applications, corporate bodies, and governments. With the …
continues to affect a host of web applications, corporate bodies, and governments. With the …
IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process
K Kandasamy, S Srinivas, K Achuthan… - EURASIP Journal on …, 2020 - Springer
Security vulnerabilities of the modern Internet of Things (IoT) systems are unique, mainly
due to the complexity and heterogeneity of the technology and data. The risks born out of …
due to the complexity and heterogeneity of the technology and data. The risks born out of …
[HTML][HTML] Using data mining techniques to explore security issues in smart living environments in Twitter
JR Saura, D Palacios-Marqués… - Computer …, 2021 - Elsevier
In present-day in consumers' homes, there are millions of Internet-connected devices that
are known to jointly represent the Internet of Things (IoT). The development of the IoT …
are known to jointly represent the Internet of Things (IoT). The development of the IoT …
Blockchain enabled industrial Internet of Things technology
The emerging blockchain technology shows promising potential to enhance industrial
systems and the Internet of things (IoT) by providing applications with redundancy …
systems and the Internet of things (IoT) by providing applications with redundancy …
[HTML][HTML] Technological capabilities in the era of the digital economy for integration into cyber-physical systems and the IoT using decision-making approach
In the digital economy, innovators have to deal with the value-capture problem, which
necessitates different capabilities. They need to be fully aware of the dynamics of platforms …
necessitates different capabilities. They need to be fully aware of the dynamics of platforms …
Integrating Industry 4.0 and circular economy: a review
Purpose Industry 4.0 and circular economy are the two major areas in the current
manufacturing industry. However, the adoption and implementation of Industry 4.0 and …
manufacturing industry. However, the adoption and implementation of Industry 4.0 and …