A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

IoT Privacy and security: Challenges and solutions

L Tawalbeh, F Muheidat, M Tawalbeh, M Quwaider - Applied Sciences, 2020 - mdpi.com
Privacy and security are among the significant challenges of the Internet of Things (IoT).
Improper device updates, lack of efficient and robust security protocols, user unawareness …

Metaverse: Survey, applications, security, and opportunities

J Sun, W Gan, HC Chao, PS Yu - arXiv preprint arXiv:2210.07990, 2022 - arxiv.org
As a fusion of various emerging digital technologies, the Metaverse aims to build a virtual
shared digital space. It is closely related to extended reality, digital twin, blockchain, and …

IoT elements, layered architectures and security issues: A comprehensive survey

M Burhan, RA Rehman, B Khan, BS Kim - sensors, 2018 - mdpi.com
The use of the Internet is growing in this day and age, so another area has developed to use
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies

C Xenofontos, I Zografopoulos… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications
spanning from the consumer domain to commercial and industrial systems. The steep …

Cybersecurity of smart inverters in the smart grid: A survey

Y Li, J Yan - IEEE Transactions on Power Electronics, 2022 - ieeexplore.ieee.org
The penetration of distributed energy resources (DERs) in smart grids significantly increases
the number of field devices owned and controlled by consumers, aggregators, third parties …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

A survey on network security for cyber–physical systems: From threats to resilient design

S Kim, KJ Park, C Lu - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …