A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
A Comprehensive survey on cyber-physical smart grid testbed architectures: Requirements and challenges
The integration of improved control techniques with advanced information technologies
enables the rapid development of smart grids. The necessity of having an efficient, reliable …
enables the rapid development of smart grids. The necessity of having an efficient, reliable …
A survey on IoT platforms: Communication, security, and privacy perspectives
Abstract The Internet of Things (IoT) redefines the way how commodity and industrial tasks
are performed every day. The integration of sensors, lightweight computation, and the …
are performed every day. The integration of sensors, lightweight computation, and the …
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …
some form of smart device in their homes or workplaces. These devices are often off-the …
[PDF][PDF] MINOS: A Lightweight Real-Time Cryptojacking Detection System.
Emerging WebAssembly (Wasm)-based cryptojacking malware covertly uses the
computational resources of users without their consent or knowledge. Indeed, most victims …
computational resources of users without their consent or knowledge. Indeed, most victims …
Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
Kratos: Multi-user multi-device-aware access control system for the smart home
In a smart home system, multiple users have access to multiple devices, typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
Z-iot: Passive device-class fingerprinting of zigbee and z-wave iot devices
In addition to traditional networking devices (eg, gateways, firewalls), current corporate and
industrial networks integrate resource-limited Internet of Things (IoT) devices like smart …
industrial networks integrate resource-limited Internet of Things (IoT) devices like smart …
[HTML][HTML] Machine learning for securing Cyber–Physical Systems under cyber attacks: A survey
C Fei, J Shen - Franklin Open, 2023 - Elsevier
With the proliferation of cyber attacks targeting cyber–physical systems (CPS), ensuring the
security of CPS under such attacks has become increasingly challenging. Machine learning …
security of CPS under such attacks has become increasingly challenging. Machine learning …
Real-time analysis of privacy-(un) aware IoT applications
Users trust IoT apps to control and automate their smart devices. These apps necessarily
have access to sensitive data to implement their functionality. However, users lack visibility …
have access to sensitive data to implement their functionality. However, users lack visibility …