Cyber-physical systems and their security issues
The creation of cyber-physical systems posed new challenges for people. Ensuring the
information security of cyber-physical systems is one of the most complex problems in a …
information security of cyber-physical systems is one of the most complex problems in a …
Fog/edge computing-based IoT (FECIoT): Architecture, applications, and research issues
The Internet-of-Things (IoT) is the future of the Internet, where everything will be connected.
Studies have revealed that fog/edge computing-based services will play a major role in …
Studies have revealed that fog/edge computing-based services will play a major role in …
[HTML][HTML] Factors influencing blockchain adoption in supply chain management practices: A study based on the oil industry
Planning to adopt the Blockchain is very active in many industries, especially in supply
chains. Researchers believe that the Radio-frequency identification (RFIDs), yesterday's …
chains. Researchers believe that the Radio-frequency identification (RFIDs), yesterday's …
False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach
TY Zhang, D Ye - Automatica, 2020 - Elsevier
In this paper, we consider the security problem of dynamic state estimations in cyber–
physical systems (CPSs) when the sensors are compromised by false data injection (FDI) …
physical systems (CPSs) when the sensors are compromised by false data injection (FDI) …
Construction 4.0
With the pervasive use of Building Information Modelling (BIM), lean principles, digital
technologies, and offsite construction, the industry is at the cusp of this transformation. The …
technologies, and offsite construction, the industry is at the cusp of this transformation. The …
Cyber physical systems security: Analysis, challenges and solutions
Y Ashibani, QH Mahmoud - Computers & Security, 2017 - Elsevier
Abstract Cyber Physical Systems (CPS) are networked systems of cyber (computation and
communication) and physical (sensors and actuators) components that interact in a …
communication) and physical (sensors and actuators) components that interact in a …
A deep learning ensemble for network anomaly and cyber-attack detection
Currently, expert systems and applied machine learning algorithms are widely used to
automate network intrusion detection. In critical infrastructure applications of communication …
automate network intrusion detection. In critical infrastructure applications of communication …
PoRX: A reputation incentive scheme for blockchain consensus of IIoT
Abstract Industrial Internet of Things (IIoT) refers to all kinds of equipment in industrial
production, whether it is machine equipment in factories or engine in automobiles and …
production, whether it is machine equipment in factories or engine in automobiles and …
Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective
Nowadays, the industrial sector is being challenged by several cybersecurity concerns.
Direct attacks by malicious persons and (or) software form part of the severe jeopardies of …
Direct attacks by malicious persons and (or) software form part of the severe jeopardies of …
SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology
The growing demand for human-independent comfortable lifestyle has emboldened the
development of smart home. A typical keenly intellective home includes many Internet of …
development of smart home. A typical keenly intellective home includes many Internet of …