A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future
Due to the advancement in communication networks, metering and smart control systems,
as well as the prevalent use of Internet-based structures, new forms of power systems have …
as well as the prevalent use of Internet-based structures, new forms of power systems have …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
[HTML][HTML] Peer-to-peer trust management in intelligent transportation system: An Aumann's agreement theorem based approach
TR Ramesh, M Vijayaragavan, M Poongodi, M Hamdi… - ICT Express, 2022 - Elsevier
Vehicular ad hoc network (VANETs) has gained wide popularity such that it is necessary to
incorporate trust among each node in the network. However, trust management among …
incorporate trust among each node in the network. However, trust management among …
[HTML][HTML] IoT Privacy and security: Challenges and solutions
Privacy and security are among the significant challenges of the Internet of Things (IoT).
Improper device updates, lack of efficient and robust security protocols, user unawareness …
Improper device updates, lack of efficient and robust security protocols, user unawareness …
Privacy-preserved data sharing towards multiple parties in industrial IoTs
The effective physical data sharing has been facilitating the functionality of Industrial IoTs,
which is believed to be one primary basis for Industry 4.0. These physical data, while …
which is believed to be one primary basis for Industry 4.0. These physical data, while …
Intrusion detection in the iot under data and concept drifts: Online deep learning approach
OA Wahab - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Although the existing machine learning-based intrusion detection systems in the Internet of
Things (IoT) usually perform well in static environments, they struggle to preserve their …
Things (IoT) usually perform well in static environments, they struggle to preserve their …
Machine learning for the detection and identification of Internet of Things devices: A survey
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a
variety of emerging services and applications. However, the presence of rogue IoT devices …
variety of emerging services and applications. However, the presence of rogue IoT devices …
Internet of things and big data analytics for smart and connected communities
This paper promotes the concept of smart and connected communities SCC, which is
evolving from the concept of smart cities. SCC are envisioned to address synergistically the …
evolving from the concept of smart cities. SCC are envisioned to address synergistically the …
[HTML][HTML] Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach
Abstract Connected and Autonomous Vehicles (CAVs) constitute an automotive
development carrying paradigm-shifting potential that may soon be embedded into a …
development carrying paradigm-shifting potential that may soon be embedded into a …
Counter-unmanned aircraft system (s)(C-UAS): State of the art, challenges, and future trends
Unmanned aircraft systems (UAS), or unmanned aerial vehicles, often referred to as drones,
have been experiencing healthy growth in the United States and around the world. The …
have been experiencing healthy growth in the United States and around the world. The …