[HTML][HTML] Demystifying in-vehicle intrusion detection systems: A survey of surveys and a meta-taxonomy

G Karopoulos, G Kambourakis, E Chatzoglou… - Electronics, 2022 - mdpi.com
Breaches in the cyberspace due to cyber-physical attacks can harm the physical space, and
any type of vehicle is an alluring target for wrongdoers for an assortment of reasons …

A systematic review of data quality in CPS and IoT for industry 4.0

A Goknil, P Nguyen, S Sen, D Politaki, H Niavis… - ACM Computing …, 2023 - dl.acm.org
The Internet of Things (IoT) and Cyber-Physical Systems (CPS) are the backbones of
Industry 4.0, where data quality is crucial for decision support. Data quality in these systems …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

A secure ensemble learning-based fog-cloud approach for cyberattack detection in IoMT

F Khan, MA Jan, R Alturki, MD Alshehri… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) effectively tackles several shortcomings of
conventional healthcare systems. It includes medical personnel shortages, patient care …

IoT security certifications: Challenges and potential approaches

A Cirne, PR Sousa, JS Resende, L Antunes - Computers & Security, 2022 - Elsevier
Abstract The Internet of Things (IoT) has changed how we interact with the world around us.
Many devices are moving from offline to online mode, connecting between them and the …

Securing public safety communications on commercial and tactical 5G networks: A survey and future research directions

J Suomalainen, J Julku, M Vehkaperä… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The forthcoming communication networks for public safety authorities rely on the fifth
generation (5G) of mobile networking technologies. Police officers, paramedics, border …

Defining security requirements with the common criteria: Applications, adoptions, and challenges

N Sun, CT Li, H Chan, BD Le, MZ Islam… - IEEE …, 2022 - ieeexplore.ieee.org
Advances in emerging Information and Communications Technology (ICT) technologies
push the boundaries of what is possible and open up new markets for innovative ICT …

EU cybersecurity act and IoT certification: landscape, perspective and a proposed template scheme

A Khurshid, R Alsaaidi, M Aslam, S Raza - IEEE Access, 2022 - ieeexplore.ieee.org
The vulnerabilities in deployed IoT devices are a threat to critical infrastructure and user
privacy. There is ample ongoing research and efforts to produce devices that are secure-by …

[HTML][HTML] Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm

H Jin, S Zhang, B Zhang, S Dong, X Liu… - Journal of King Saud …, 2023 - Elsevier
In view of the differences and limitations of the cognitive abilities of both sides of network
security attack and defense, the current network defense decision-making methods using …

How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond

N Sun, CT Li, H Chan, MZ Islam, MR Islam… - Ieee …, 2022 - ieeexplore.ieee.org
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and
other unexpected events, is essential for organizations facing inundating security threats on …