Intelligent robotics—A systematic review of emerging technologies and trends

JT Licardo, M Domjan, T Orehovački - Electronics, 2024 - mdpi.com
Intelligent robotics has the potential to revolutionize various industries by amplifying output,
streamlining operations, and enriching customer interactions. This systematic literature …

The internet of modular robotic things: Issues, limitations, challenges, & solutions

JPA Yaacoub, HN Noura, B Piranda - Internet of Things, 2023 - Elsevier
The world is becoming more digitized with the rise of modular robotic systems. Therefore,
with the increasing demands and needs for robotics, the modular robotic domain was …

Gazeta: Game-theoretic zero-trust authentication for defense against lateral movement in 5g iot networks

Y Ge, Q Zhu - IEEE Transactions on Information Forensics and …, 2023 - ieeexplore.ieee.org
The increasing connectivity in the 5G Internet of Things networks has enlarged the attack
surface and made the traditional security defense inadequate for sophisticated attackers …

Scenario-agnostic zero-trust defense with explainable threshold policy: A meta-learning approach

Y Ge, T Li, Q Zhu - IEEE INFOCOM 2023-IEEE Conference on …, 2023 - ieeexplore.ieee.org
The increasing connectivity and intricate remote access environment have made traditional
perimeter-based network defense vulnerable. Zero trust becomes a promising approach to …

Sros2: Usable cyber security tools for ros 2

V Mayoral-Vilches, R White, G Caiazza… - 2022 IEEE/RSJ …, 2022 - ieeexplore.ieee.org
ROS 2 is rapidly becoming a standard in the robotics industry. Built upon DDS as its default
communication middleware and used in safety-critical scenarios, adding secu-rity to robots …

Robot cybersecurity, a review

V Mayoral-Vilches - International Journal of Cyber Forensics and …, 2022 - conceptechint.net
Robots are often shipped insecure and in some cases fully unprotected. The rationale
behind is threefold: first, defensive security mechanisms for robots are still in their early …

Factors influencing continuance intention of participants in crowdsourcing

H Jo, Y Bang - Humanities and Social Sciences Communications, 2023 - nature.com
In a dynamic business environment, the roles of contests and crowd-sourcing are
increasingly acknowledged. However, the factors driving sustained participation in these …

Decision-dominant strategic defense against lateral movement for 5g zero-trust multi-domain networks

T Li, Y Pan, Q Zhu - Network Security Empowered by Artificial Intelligence, 2024 - Springer
Multi-domain warfare is a military doctrine that leverages capabilities from different domains,
including air, land, sea, space, and cyberspace, to create a highly interconnected battle …

Trust threshold policy for explainable and adaptive zero-trust defense in enterprise networks

Y Ge, Q Zhu - 2022 IEEE Conference on Communications and …, 2022 - ieeexplore.ieee.org
In response to the vulnerabilities in traditional perimeter-based network security, the zero
trust framework is a promising approach to secure modern network systems and address the …

Adaptive computing in robotics, leveraging ros 2 to enable software-defined hardware for fpgas

V Mayoral-Vilches, G Corradi - arXiv preprint arXiv:2109.03276, 2021 - arxiv.org
Traditional software development in robotics is about programming functionality in the CPU
of a given robot with a pre-defined architecture and constraints. With adaptive computing …