Cyber-physical systems and their security issues

R Alguliyev, Y Imamverdiyev, L Sukhostat - Computers in Industry, 2018 - Elsevier
The creation of cyber-physical systems posed new challenges for people. Ensuring the
information security of cyber-physical systems is one of the most complex problems in a …

Fog/edge computing-based IoT (FECIoT): Architecture, applications, and research issues

B Omoniwa, R Hussain, MA Javed… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is the future of the Internet, where everything will be connected.
Studies have revealed that fog/edge computing-based services will play a major role in …

[HTML][HTML] Factors influencing blockchain adoption in supply chain management practices: A study based on the oil industry

J Aslam, A Saleem, NT Khan, YB Kim - Journal of Innovation & Knowledge, 2021 - Elsevier
Planning to adopt the Blockchain is very active in many industries, especially in supply
chains. Researchers believe that the Radio-frequency identification (RFIDs), yesterday's …

False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach

TY Zhang, D Ye - Automatica, 2020 - Elsevier
In this paper, we consider the security problem of dynamic state estimations in cyber–
physical systems (CPSs) when the sensors are compromised by false data injection (FDI) …

Construction 4.0

A Sawhney, M Riley, J Irizarry… - Sawhney, A., Riley, M …, 2020 - api.taylorfrancis.com
With the pervasive use of Building Information Modelling (BIM), lean principles, digital
technologies, and offsite construction, the industry is at the cusp of this transformation. The …

Cyber physical systems security: Analysis, challenges and solutions

Y Ashibani, QH Mahmoud - Computers & Security, 2017 - Elsevier
Abstract Cyber Physical Systems (CPS) are networked systems of cyber (computation and
communication) and physical (sensors and actuators) components that interact in a …

A deep learning ensemble for network anomaly and cyber-attack detection

V Dutta, M Choraś, M Pawlicki, R Kozik - Sensors, 2020 - mdpi.com
Currently, expert systems and applied machine learning algorithms are widely used to
automate network intrusion detection. In critical infrastructure applications of communication …

PoRX: A reputation incentive scheme for blockchain consensus of IIoT

EK Wang, Z Liang, CM Chen, S Kumari… - Future generation …, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) refers to all kinds of equipment in industrial
production, whether it is machine equipment in factories or engine in automobiles and …

Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective

UPD Ani, H He, A Tiwari - Journal of Cyber Security Technology, 2017 - Taylor & Francis
Nowadays, the industrial sector is being challenged by several cybersecurity concerns.
Direct attacks by malicious persons and (or) software form part of the severe jeopardies of …

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology

S Singh, IH Ra, W Meng, M Kaur… - International Journal of …, 2019 - journals.sagepub.com
The growing demand for human-independent comfortable lifestyle has emboldened the
development of smart home. A typical keenly intellective home includes many Internet of …