[HTML][HTML] Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

[HTML][HTML] Cyber security of robots: A comprehensive survey

A Botta, S Rotbei, S Zinno, G Ventre - Intelligent Systems with Applications, 2023 - Elsevier
The use of robots in the modern world is widespread, not only in medicine and automated
vehicles, but also in national security, defense, and industry. Together with the growing …

A bibliometric and multi-disciplinary quasi-systematic analysis of social robots: Past, future, and insights of human-robot interaction

SF Wamba, MM Queiroz, L Hamzi - Technological Forecasting and Social …, 2023 - Elsevier
Social robots and their novel applications are slowly emerging to become an indispensable
part of society and businesses. While the field of social robotics has been very …

[HTML][HTML] Intelligent beetle antennae search for UAV sensing and avoidance of obstacles

Q Wu, X Shen, Y Jin, Z Chen, S Li, AH Khan, D Chen - Sensors, 2019 - mdpi.com
Based on a bio-heuristic algorithm, this paper proposes a novel path planner called obstacle
avoidance beetle antennae search (OABAS) algorithm, which is applied to the global path …

Cyber physical system fraud analysis by mobile robot

AS Rajawat, R Rawat, RN Shaw, A Ghosh - Machine learning for robotics …, 2021 - Springer
The improvement of intelligent surveillance systems is a functioning examination region. In
this specific situation, mobile furthermore, multi-useful robots are commonly received as …

[PDF][PDF] Cybsersecurity Issues in Robotics.

G Lacava, A Marotta, F Martinelli, A Saracino… - J. Wirel. Mob. Networks …, 2021 - jowua.com
Cybersecurity in Robotics is a rapidly developing area that draws attention from practitioners
and researchers. An increase in cyber-attacks, combined with the development of …

[HTML][HTML] The comparison of cybersecurity datasets

A Alshaibi, M Al-Ani, A Al-Azzawi, A Konev… - Data, 2022 - mdpi.com
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer
according to a majority of the sources. In IIoT, different machine learning (ML) and deep …

[HTML][HTML] A systematic review on social robots in public spaces: Threat landscape and attack surface

SO Oruma, M Sánchez-Gordón, R Colomo-Palacios… - Computers, 2022 - mdpi.com
There is a growing interest in using social robots in public spaces for indoor and outdoor
applications. The threat landscape is an important research area being investigated and …

A novel solution for securing robot communications based on the MQTT protocol and ROS

M Mukhandi, D Portugal, S Pereira… - 2019 IEEE/SICE …, 2019 - ieeexplore.ieee.org
With the growing use of the Robot Operating System (ROS), it can be argued that it has
become a de-facto framework for developing robotic solutions. ROS is used to build robotic …

Security and performance considerations in ros 2: A balancing act

J Kim, JM Smereka, C Cheung, S Nepal… - arXiv preprint arXiv …, 2018 - arxiv.org
Robot Operating System (ROS) 2 is a ground-up re-design of ROS 1 to support performance
critical cyber-physical systems (CPSs) using the Data Distribution Service (DDS) …