A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …
Network intrusion detection for IoT security based on learning techniques
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
IoT Privacy and security: Challenges and solutions
Privacy and security are among the significant challenges of the Internet of Things (IoT).
Improper device updates, lack of efficient and robust security protocols, user unawareness …
Improper device updates, lack of efficient and robust security protocols, user unawareness …
Metaverse: Survey, applications, security, and opportunities
As a fusion of various emerging digital technologies, the Metaverse aims to build a virtual
shared digital space. It is closely related to extended reality, digital twin, blockchain, and …
shared digital space. It is closely related to extended reality, digital twin, blockchain, and …
IoT elements, layered architectures and security issues: A comprehensive survey
The use of the Internet is growing in this day and age, so another area has developed to use
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …
Security for 5G and beyond
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …
connect almost all aspects of life through the network with much higher speed, very low …
Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies
C Xenofontos, I Zografopoulos… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications
spanning from the consumer domain to commercial and industrial systems. The steep …
spanning from the consumer domain to commercial and industrial systems. The steep …
Cybersecurity of smart inverters in the smart grid: A survey
The penetration of distributed energy resources (DERs) in smart grids significantly increases
the number of field devices owned and controlled by consumers, aggregators, third parties …
the number of field devices owned and controlled by consumers, aggregators, third parties …
Reinforcement learning-based physical cross-layer security and privacy in 6G
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
A survey on network security for cyber–physical systems: From threats to resilient design
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …
world and control software in computing systems. In CPS, the real world and the computing …