A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Cyber security in the smart grid: Survey and challenges

W Wang, Z Lu - Computer networks, 2013 - Elsevier
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …

A survey on cyber security for smart grid communications

Y Yan, Y Qian, H Sharif, D Tipper - … communications surveys & …, 2012 - ieeexplore.ieee.org
A smart grid is a new form of electricity network with high fidelity power-flow control, self-
healing, and energy reliability and energy security using digital communications and control …

A taxonomy of DDoS attack and DDoS defense mechanisms

J Mirkovic, P Reiher - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety
of both the attacks and the defense approaches is overwhelming. This paper presents two …

A survey of IoT protocols and their security issues through the lens of a generic IoT stack

J Tournier, F Lesueur, F Le Mouël, L Guyon… - Internet of Things, 2021 - Elsevier
Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its
wireless technology. These security issues are challenging because IoT protocols are …

Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS/GEM communications

MA Al-Shareeda, S Manickam, SA Laghari, A Jaisan - Sustainability, 2022 - mdpi.com
Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or
Industry 4.0), various industrial machines are present in the market and manufacturing …

Denial of service in sensor networks

AD Wood, JA Stankovic - computer, 2002 - ieeexplore.ieee.org
Sensor networks hold the promise of facilitating large-scale, real-time data processing in
complex environments, helping to protect and monitor military, environmental, safety-critical …

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …

Survey of network-based defense mechanisms countering the DoS and DDoS problems

T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …