Digital twin: A comprehensive survey of security threats

C Alcaraz, J Lopez - IEEE Communications Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …

Recent advances in opinion propagation dynamics: A 2020 survey

H Noorazar - The European Physical Journal Plus, 2020 - Springer
Opinion dynamics have attracted the interest of researchers from different fields. Local
interactions among individuals create interesting dynamics for the system as a whole. Such …

Recent technologies, security countermeasure and ongoing challenges of Industrial Internet of Things (IIoT): A survey

SF Tan, A Samsudin - Sensors, 2021 - mdpi.com
The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security
and privacy issues becoming critically challenging. Numerous surveys have been published …

Intrusion detection framework for industrial internet of things using software defined network

H Alshahrani, A Khan, M Rizwan, MSA Reshan… - Sustainability, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) refers to the employment of the Internet of Things in
industrial management, where a substantial number of machines and devices are linked …

SBI model for the detection of advanced persistent threat based on strange behavior of using credential dumping technique

N Mohamed, B Belaton - IEEE Access, 2021 - ieeexplore.ieee.org
This study investigated the shift from the manual approach of processing data to the digitized
method making organizational data prone to attack by cybercriminals. The latest threat …

A TOPSIS-based relocalization algorithm in wireless sensor networks

K Fang, T Wang, X Zhou, Y Ren… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Selecting reliable beacon nodes plays a significant role in relocalizing unknown nodes in a
wireless sensor network. When the position of a beacon node is drifted or is spoofed, it …

AntiConcealer: Reliable detection of adversary concealed behaviors in EdgeAI-assisted IoT

J Zhang, MZA Bhuiyan, X Yang, T Wang… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the rapidly developing technologies today that attract huge
real-world applications. However, the reality is that IoT is easily vulnerable to numerous …

E‐minBatch GraphSAGE: An Industrial Internet Attack Detection Model

J Lan, JZ Lu, GG Wan, YY Wang… - Security and …, 2022 - Wiley Online Library
The Industrial Internet has grown rapidly in recent years, and attacks against the Industrial
Internet have also increased. When compared with the traditional Internet, the industrial …

E-APTDetect: Early Advanced Persistent Threat Detection in Critical Infrastructures with Dynamic Attestation

B Genge, P Haller, AS Roman - Applied Sciences, 2023 - mdpi.com
Advanced Persistent Threats (APTs) represent a complex series of techniques directed
against a particular organization, where the perpetrator is able to hide its presence for a …

SAMGRID: security authorization and monitoring module based on SealedGRID platform

G Suciu, A Farao, G Bernardinetti, I Palamà… - Sensors, 2022 - mdpi.com
IoT devices present an ever-growing domain with multiple applicability. This technology has
favored and still favors many areas by creating critical infrastructures that are as profitable as …