A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues

G Sharma, S Vidalis, N Anand, C Menon, S Kumar - Electronics, 2021 - mdpi.com
Security is a mandatory issue in any network, where sensitive data are transferred safely in
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …

A Comparative Analysis for Harnessing Digital Twin Platforms for Net-Zero Manufacturing

D Parle, G Sharma, N Anand, N Padgaonkar… - IEEE …, 2024 - ieeexplore.ieee.org
A comprehensive review of digital twin platforms carried out through comparative study and
analysis of nearly (~ 100+ aprox) digital twins. It includes commercial and open-source …

Scalable and Multi-Channel Real-Time Low Cost Monitoring System for PEM Electrolyzers Based on IoT Applications

AB Paredes-Baños, A Molina-Garcia, A Mateo-Aroca… - Electronics, 2024 - mdpi.com
This paper discusses and evaluates a novel multi-channel real-time architecture aimed at
monitoring a Proton Exchange Membrane (PEM) electrolyzer, both at the individual cell and …

Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases

G Sharma, S Vidalis, C Menon, N Anand - Multimedia Tools and …, 2023 - Springer
Proactive security plays a vital role in preventing the attack before entering active mode. In
the modern information environment, it depends on the vulnerability management …

Cybersecurity and data science

K Szczypiorski - Electronics, 2022 - mdpi.com
Towards the end of the Cold War in 1985, in reference to the theory of leadership for the first
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …

Analysis of cyber-attacks for modern digital railway system using cyber range

G Sharma, E Sherif, M He… - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
The simulation of a modern railway system on the cyber range will investigate the supple
behavior of cyber-attacks in a modern digital railway system. The contemporary digital …

Study and analysis of threat assessment model and methodology in real-time informational environment

G Sharma, S Vidalis, C Menon, N Anand… - 2021 IEEE Bombay …, 2021 - ieeexplore.ieee.org
The threat assessment model and methodology are developed based on the study and
analysis of threat agents found in the real-time informational network. These models and …

Designing Effective User Interfaces for Technology-based IPO Investment Platforms

SP Srivastava, S Srivastava… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
In the stock market, the two critical enablers aid in greater investment returns: a
shareholder's excellent business knowledge and a low purchase price. However, it is …

Network Topology Based Identification and Analysis of Security Threats in Data Centres

J Kampars, G Mosāns, J Grabis - International Baltic Conference on Digital …, 2024 - Springer
Various physical and virtual devices are interconnected and mutually dependent on each
other in modern large-scale data centres. Security threats if analysed without considering …

Check for Network Topology Based Identification and Analysis of Security Threats in Data Centres Jānis Kampars, Guntis Mosans (), and Jānis Grabis D Riga …

J Kampars - Digital Business and Intelligent Systems: 16th …, 2024 - books.google.com
Various physical and virtual devices are interconnected and mutually dependent on each
other in modern large-scale data centres. Security threats if analysed without considering …