[HTML][HTML] The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research

B Ramos-Cruz, J Andreu-Perez, L Martínez - Neurocomputing, 2024 - Elsevier
In today's world, it is vital to have strong cybersecurity measures in place. To combat the
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …

[HTML][HTML] Blockchain-assisted hybrid harris hawks optimization based deep DDoS attack detection in the IoT environment

I Katib, M Ragab - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) is developing as a novel phenomenon that is applied in the
growth of several crucial applications. However, these applications continue to function on a …

Risk Management and Cybersecurity in Transportation and Warehousing

A Khan, NZ Jhanjhi, HAHBH Omar… - … Measures for Logistics …, 2024 - igi-global.com
Transportation and warehousing are vital components of logistics corporations. Their
continuous uninterrupted functioning is of paramount significance for the enterprises …

[HTML][HTML] Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application

A Shan, S Myeong - Sensors, 2024 - mdpi.com
Cyber-security challenges are growing globally and are specifically targeting critical
infrastructure. Conventional countermeasure practices are insufficient to provide proactive …

[HTML][HTML] AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure

T Rathod, NK Jadav, S Tanwar, Z Polkowski… - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) is the most abundant technology in the fields of manufacturing,
automation, transportation, robotics, and agriculture, utilizing the IoT's sensors-sensing …

[PDF][PDF] Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System.

R Salama, M Ragab - Computer Systems Science & …, 2023 - cdn.techscience.cn
In the Internet of Things (IoT) based system, the multi-level client's requirements can be
fulfilled by incorporating communication technologies with distributed homogeneous …

[HTML][HTML] Securing Critical Infrastructure with Blockchain Technology: An Approach to Cyber-Resilience

J Govea, W Gaibor-Naranjo, W Villegas-Ch - Computers, 2024 - mdpi.com
Currently, in the digital era, critical infrastructure is increasingly exposed to cyber threats to
their operation and security. This study explores the use of blockchain technology to address …

[PDF][PDF] Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme.

MA Alohali, M Elsadig, FN Al-Wesabi… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
With recent advancements in information and communication technology, a huge volume of
corporate and sensitive user data was shared consistently across the network, making it …

[PDF][PDF] Internet of Things Supported Airport Boarding System and Evaluation with Fuzzy.

T Memika, TK Polat - Intelligent Automation & Soft Computing, 2023 - researchgate.net
The existing systems sustained with the investments made require more automation and
digital transformation with the continuous advancement of technology. The aviation industry …

An awareness model for the use of information technology security policies in the petroleum retail sector in South Africa

Z Nkandi - 2023 - etd.cput.ac.za
The petroleum (oil and gas) retail industry in South Africa depends on the use of Information
Technology (IT) in its operations, including distribution. Consequently, digital transformation …