A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …
significant attention from the research community. To this end, several surveys were put …
A survey of denial-of-service attacks and solutions in the smart grid
The scope, scale, and intensity of real, as well as potential attacks, on the Smart Grid have
been increasing and thus gaining more attention. An important component of Smart Grid …
been increasing and thus gaining more attention. An important component of Smart Grid …
State-of-the-art survey of artificial intelligent techniques for IoT security
TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …
innovation community's considerable attention. Several surveys have covered different IoT …
IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …
[HTML][HTML] Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security
The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of
traditional manufacturing and production technologies with IP communications. Legacy …
traditional manufacturing and production technologies with IP communications. Legacy …
Classifying resilience approaches for protecting smart grids against cyber threats
Smart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are
caused by the usage of heterogeneous communication technologies and their distributed …
caused by the usage of heterogeneous communication technologies and their distributed …
Watch me, but don't touch me! contactless control flow monitoring via electromagnetic emanations
Trustworthy operation of industrial control systems depends on secure and real-time code
execution on the embedded programmable logic controllers (PLCs). The controllers monitor …
execution on the embedded programmable logic controllers (PLCs). The controllers monitor …
Honeypot identification in softwarized industrial cyber–physical systems
In softwarized industrial networking, honeypot identification is very important for both the
attacker and the defender. Existing honeypot identification relies on simple features of …
attacker and the defender. Existing honeypot identification relies on simple features of …
Honeyplc: A next-generation honeypot for industrial control systems
Industrial Control Systems (ICS) provide management and control capabilities for mission-
critical utilities such as the nuclear, power, water, and transportation grids. Within ICS …
critical utilities such as the nuclear, power, water, and transportation grids. Within ICS …