A survey on digital twin for industrial internet of things: Applications, technologies and tools
Digital twin for the industrial Internet of Things (DT-IIoT) creates a high-fidelity, fine-grained,
low-cost digital replica of the cyber-physical integrated Internet for industry. Powered by …
low-cost digital replica of the cyber-physical integrated Internet for industry. Powered by …
A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
A novel architectural framework on IoT ecosystem, security aspects and mechanisms: a comprehensive survey
M Bouzidi, N Gupta, FA Cheikh, A Shalaginov… - IEEE …, 2022 - ieeexplore.ieee.org
For the past few years, the Internet of Things (IoT) technology continues to not only gain
popularity and importance, but also witnesses the true realization of everything being smart …
popularity and importance, but also witnesses the true realization of everything being smart …
Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks
This study investigates the secure and privacy-preserving consensus problem for a class of
Lipschitz nonlinear multiagent systems (MASs) under undirected topology and multiple …
Lipschitz nonlinear multiagent systems (MASs) under undirected topology and multiple …
Packet header compression: A principle-based survey of standards and recent research studies
M Tömösközi, M Reisslein… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Many emerging communication applications transmit packets with small payloads, yet
require rich metadata context for the proper functioning of the various involved protocol …
require rich metadata context for the proper functioning of the various involved protocol …
{SMACK}: Semantically Meaningful Adversarial Audio Attack
Voice controllable systems rely on speech recognition and speaker identification as the key
enabling technologies. While they bring revolutionary changes to our daily lives, their …
enabling technologies. While they bring revolutionary changes to our daily lives, their …
When evil calls: Targeted adversarial voice over ip network
As the COVID-19 pandemic fundamentally reshaped the remote life and working styles,
Voice over IP (VoIP) telephony and video conferencing have become a primary method of …
Voice over IP (VoIP) telephony and video conferencing have become a primary method of …
Antifake: Using adversarial audio to prevent unauthorized speech synthesis
The rapid development of deep neural networks and generative AI has catalyzed growth in
realistic speech synthesis. While this technology has great potential to improve lives, it also …
realistic speech synthesis. While this technology has great potential to improve lives, it also …
{ARI}: Attestation of Real-time Mission Execution Integrity
With the proliferation of autonomous safety-critical cyber-physical systems (CPS) in our daily
life, their security is becoming ever more important. Remote attestation is a powerful …
life, their security is becoming ever more important. Remote attestation is a powerful …
Detection of stealthy jamming for UAV-assisted wireless communications: An HMM-based method
Due to the high mobility, low cost and high robustness of line-of-sight (LoS) channels,
unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless …
unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless …