|
|
|
Woo-Hyun Choi and Jung-Ho Lewe
This study proposes a deep learning model utilizing the BACnet (Building Automation and Control Network) protocol for the real-time detection of mechanical faults and security vulnerabilities in building automation systems. Integrating various machine le...
ver más
|
|
|
|
|
|
|
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual...
ver más
|
|
|
|
|
|
|
Carlos Blanco, Antonio Santos-Olmo and Luis Enrique Sánchez
As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities and potential attacks increases accordingly. Facing these challenges, th...
ver más
|
|
|
|
|
|
|
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani...
ver más
|
|
|
|
|
|
|
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon...
ver más
|
|
|
|
|
|
|
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of...
ver más
|
|
|
|
|
|
|
Adam James Fenton
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary...
ver más
|
|
|
|
|
|
|
Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya and Mohammed Ali
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical dev...
ver más
|
|
|
|
|
|
|
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ...
ver más
|
|
|
|
|
|
|
Ammar Odeh and Anas Abu Taleb
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles. This has spurred groundbreaking advancements while concurrently posing persisten...
ver más
|
|
|
|