|
|
|
Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective str...
ver más
|
|
|
|
|
|
|
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac...
ver más
|
|
|
|
|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani...
ver más
|
|
|
|
|
|
|
Jeremy Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite and Siraj Ahmed Shaikh
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS) are becoming increasingly complex, but demonstrating the security of CPS is hard and security is frequently compromised. These compromises can lead to safety failure...
ver más
|
|
|
|
|
|
|
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and...
ver más
|
|
|
|
|
|
|
Giseok Jeong, Kookjin Kim, Sukjoon Yoon, Dongkyoo Shin and Jiwon Kang
As the world undergoes rapid digitalization, individuals and objects are becoming more extensively connected through the advancement of Internet networks. This phenomenon has been observed in governmental and military domains as well, accompanied by a ri...
ver más
|
|
|
|
|
|
|
Ivan Nedyalkov
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ...
ver más
|
|
|
|
|
|
|
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, Mohammed Adam Taheir and Omprakash Kaiwartya
The widespread use of technology has made communication technology an indispensable part of daily life. However, the present cloud infrastructure is insufficient to meet the industry?s growing demands, and multi-access edge computing (MEC) has emerged as...
ver más
|
|
|
|
|
|
|
Zacharias Anastasakis, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Stavroula Bourou, Konstantinos Psychogyios, Dimitrios Skias and Theodore Zahariadis
Federated Learning is identified as a reliable technique for distributed training of ML models. Specifically, a set of dispersed nodes may collaborate through a federation in producing a jointly trained ML model without disclosing their data to each othe...
ver más
|
|
|
|