Securing wireless communication in critical infrastructure: challenges and opportunities

J Bodenhausen, C Sorgatz, T Vogt, K Grafflage… - … Conference on Mobile …, 2023 - Springer
Critical infrastructure constitutes the foundation of every society. While traditionally solely
relying on dedicated cable-based communication, this infrastructure rapidly transforms to …

Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape through Systematic Literature Review

KHM Gularte, JAR Vargas, JPJ Da Costa… - IEEE …, 2024 - ieeexplore.ieee.org
Vehicle-to-Everything (V2X) communication, essential for enhancing road safety, driving
efficiency, and traffic management, must be robust against cybersecurity threats for …

FPGA implementation of robust and low complexity template-based watermarking for digital images

K Dzhanashia, O Evsutin - Multimedia Tools and Applications, 2024 - Springer
Watermarking is a widespread technique for information protection and an invisible
alternative to quick response codes. The literature mainly considers software …

Ensemble technique of intrusion detection for IoT-edge platform

A Aldaej, I Ullah, TA Ahanger, M Atiquzzaman - Scientific Reports, 2024 - nature.com
Abstract Internet of Things (IoT) technology has revolutionized modern industrial sectors.
Moreover, IoT technology has been incorporated within several vital domains of …

Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing

S Hemavathy, J Kokila… - The Journal of …, 2024 - Springer
Edge computing has become quintessential in commercial, healthcare, and industrial
applications. It enables real-time data processing at the edge device, thus reducing the data …

Lightweight Secure Compression Scheme for Green IoT Applications

S AL FALLAH, M ARIOUA, A EL OUALKADI - Procedia Computer Science, 2024 - Elsevier
Abstract The Internet of Things (IoT) is a revolutionary paradigm that has gained significant
prominence in recent years. It represents the interconnection of everyday objects, devices …

Virtual Power Plants Security Challenges, Solutions, and Emerging Trends: A Review

SP Rao, RS Tiruvalluru, SRA Balaji… - 2024 Cyber …, 2024 - ieeexplore.ieee.org
Virtual power plants (VPPs) are used to manage and integrate renewable energy resources
for better management and coordination. This integration, combined with modern …

Challenges and Solutions in Integrating Narrowband IoT with Edge Computing: Resource Constraints, Security, Latency, and IDS Deployment

W Hendricks, B Kabaso - International Conference on Advanced …, 2023 - Springer
This study aimed to explore the integration of narrowband Internet of Things (NB-IoT) with
edge computing. The study examined existing literature regarding the resource constraints …

[引用][C] Convolutional Neural Networks based Transformer for Intrusion Detection in Edge-IoT

S Noureen - 2023 - Quaid I Azam University Islamabad