[HTML][HTML] The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research
B Ramos-Cruz, J Andreu-Perez, L Martínez - Neurocomputing, 2024 - Elsevier
In today's world, it is vital to have strong cybersecurity measures in place. To combat the
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …
[HTML][HTML] Blockchain-assisted hybrid harris hawks optimization based deep DDoS attack detection in the IoT environment
The Internet of Things (IoT) is developing as a novel phenomenon that is applied in the
growth of several crucial applications. However, these applications continue to function on a …
growth of several crucial applications. However, these applications continue to function on a …
Risk Management and Cybersecurity in Transportation and Warehousing
A Khan, NZ Jhanjhi, HAHBH Omar… - … Measures for Logistics …, 2024 - igi-global.com
Transportation and warehousing are vital components of logistics corporations. Their
continuous uninterrupted functioning is of paramount significance for the enterprises …
continuous uninterrupted functioning is of paramount significance for the enterprises …
[HTML][HTML] Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
A Shan, S Myeong - Sensors, 2024 - mdpi.com
Cyber-security challenges are growing globally and are specifically targeting critical
infrastructure. Conventional countermeasure practices are insufficient to provide proactive …
infrastructure. Conventional countermeasure practices are insufficient to provide proactive …
[HTML][HTML] AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure
T Rathod, NK Jadav, S Tanwar, Z Polkowski… - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) is the most abundant technology in the fields of manufacturing,
automation, transportation, robotics, and agriculture, utilizing the IoT's sensors-sensing …
automation, transportation, robotics, and agriculture, utilizing the IoT's sensors-sensing …
[PDF][PDF] Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System.
In the Internet of Things (IoT) based system, the multi-level client's requirements can be
fulfilled by incorporating communication technologies with distributed homogeneous …
fulfilled by incorporating communication technologies with distributed homogeneous …
[HTML][HTML] Securing Critical Infrastructure with Blockchain Technology: An Approach to Cyber-Resilience
Currently, in the digital era, critical infrastructure is increasingly exposed to cyber threats to
their operation and security. This study explores the use of blockchain technology to address …
their operation and security. This study explores the use of blockchain technology to address …
[PDF][PDF] Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme.
With recent advancements in information and communication technology, a huge volume of
corporate and sensitive user data was shared consistently across the network, making it …
corporate and sensitive user data was shared consistently across the network, making it …
[PDF][PDF] Internet of Things Supported Airport Boarding System and Evaluation with Fuzzy.
T Memika, TK Polat - Intelligent Automation & Soft Computing, 2023 - researchgate.net
The existing systems sustained with the investments made require more automation and
digital transformation with the continuous advancement of technology. The aviation industry …
digital transformation with the continuous advancement of technology. The aviation industry …
An awareness model for the use of information technology security policies in the petroleum retail sector in South Africa
Z Nkandi - 2023 - etd.cput.ac.za
The petroleum (oil and gas) retail industry in South Africa depends on the use of Information
Technology (IT) in its operations, including distribution. Consequently, digital transformation …
Technology (IT) in its operations, including distribution. Consequently, digital transformation …