Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Attack-compensated asynchronous output feedback control for stochastic switching systems with sojourn probability
Applied Mathematics and Computation (APMC), Volume 485, Issue Chttps://doi.org/10.1016/j.amc.2024.129024AbstractThis study addresses the problem of attack-compensated asynchronous output feedback control for stochastic switching systems with sojourn probability. Unlike traditional Markov/semi-Markov models that rely on transition probabilities, a novel ...
Highlights- A novel switching rule that focuses on the SP information associated with the target mode and sojourn time is addressed.
- An asynchronous controller based on an attack compensation mechanism is proposed to defend against FDIA.
- The ...
- research-articleNovember 2024
Protecting the play: An integrative review of cybersecurity in and for sports events
AbstractAlthough sport has become an important topic in management research, academics have not fully examined the area of cybersecurity and its strategic relevance in sports management, in particular in and for sports events. In the present study, we ...
- research-articleNovember 2024
Zero-trust design and assurance patterns for cyber–physical systems
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 155, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103261AbstractSecurity is paramount in all mission-critical domains, including the aerospace industry. Cyber-attacks are increasing both in number and sophistication. Zero-trust is an emerging initiative that has proven very effective for enterprise systems in ...
- articleNovember 2024
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 252, Issue Chttps://doi.org/10.1016/j.comnet.2024.110695AbstractDrones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with time from military operations like surveillance, reconnaissance to commercial operations such as transportation, agriculture. The Drone market will be grown to ...
- research-articleSeptember 2024
Multi-group consensus of multi-agent systems subject to semi-Markov jump topologies against hybrid cyber-attacks
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121092AbstractMulti-agent systems are widely used in practice. The existing results on the consensus of multi-agent systems mainly focus on the complete consensus, which can not deal with the situation of the system in the face of multiple tasks. In this paper,...
-
- research-articleJuly 2024
Data-driven attack policy design for cyber-physical systems under channel constraints
Information Sciences: an International Journal (ISCI), Volume 677, Issue Chttps://doi.org/10.1016/j.ins.2024.120894AbstractThis paper is concerned with the design of data-driven sensor injection attack for cyber-physical systems (CPSs) under channel constraints, where the attacker can only access a part of the sensor channels and the accessible channels switch over ...
- research-articleJune 2024
Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment
Knowledge and Information Systems (KAIS), Volume 66, Issue 10Pages 6001–6050https://doi.org/10.1007/s10115-024-02149-9AbstractThe fusion of Internet of Things (IoT) technology into healthcare, known as the Internet of Medical Things (IoMT), has significantly enhanced medical treatment and operational efficiency. Real-time patient monitoring (RPM) and remote diagnostics ...
- research-articleJuly 2024
Towards a Cyber Resilience Quantification Framework (CRQF) for IT infrastructure
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 247, Issue Chttps://doi.org/10.1016/j.comnet.2024.110446AbstractCyber resilience quantification is the process of evaluating and measuring an organisation’s ability to withstand, adapt to, and recover from cyber-attacks. It involves estimating IT systems, networks, and response strategies to ensure robust ...
- review-articleJune 2024
Cybersecurity threats in FinTech: A systematic review
Expert Systems with Applications: An International Journal (EXWA), Volume 241, Issue Chttps://doi.org/10.1016/j.eswa.2023.122697Highlights- Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.
- Identifying the most effective defense strategies to negate the threats by examining 74 published papers.
- Comparing the threats and defenses from ...
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot counteract. Cyber threats are extremely critical in financial ...
- research-articleJuly 2024
A multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applications
- Abdullah Lakhan,
- Mazin Abed Mohammed,
- Karrar Hameed Abdulkareem,
- Muhammet Deveci,
- Haydar Abdulameer Marhoon,
- Jan Nedoma,
- Radek Martinek
AbstractThe Intelligent Transport System (ITS) is an emerging paradigm that offers numerous services at the infrastructure level for vehicle applications. Vehicle-to-infrastructure (V2I) is an advanced form of ITS where diverse vehicle services are ...
- research-articleMay 2024
Securing healthcare data in industrial cyber-physical systems using combining deep learning and blockchain technology
- Mazin Abed Mohammed,
- Abdullah Lakhan,
- Dilovan Asaad Zebari,
- Mohd Khanapi Abd Ghani,
- Haydar Abdulameer Marhoon,
- Karrar Hameed Abdulkareem,
- Jan Nedoma,
- Radek Martinek
Engineering Applications of Artificial Intelligence (EAAI), Volume 129, Issue Chttps://doi.org/10.1016/j.engappai.2023.107612AbstractIndustrial cyber–physical systems (ICPS) are emerging platforms for various industrial applications. For instance, remote healthcare monitoring, real-time healthcare data generation, and many other applications have been integrated into the ICPS ...
- research-articleJanuary 2024
Stacking Ensemble-Based Approach for Malware Detection
AbstractThe rapid growth of Internet connectivity has resulted in a significant increase in digital attack events, many of which have devastating and severe consequences. Malware is one type of cyber attack that is becoming more common by the day. With ...
- research-articleJuly 2024
Towards Detection of Network Anomalies using Machine Learning Algorithms on the NSL-KDD Benchmark Datasets
Procedia Computer Science (PROCS), Volume 233, Issue CPages 960–969https://doi.org/10.1016/j.procs.2024.03.285AbstractIn the present era, everyone is connected via the Internet for sharing digital information. The digital data is stored using the cloud technology. However, cloud technology is speedily increasing the volume of digital information and network ...
- rapid-communicationMarch 2024
Resilient cluster consensus for discrete-time high-order multi-agent systems against malicious adversaries
Automatica (Journal of IFAC) (AJIF), Volume 159, Issue Chttps://doi.org/10.1016/j.automatica.2023.111382AbstractThis paper studies the problem of resilient cluster consensus for discrete-time high-order multi-agent systems in the presence of malicious adversaries. Based on a decomposition form of the system matrices, a high-order resilient cluster ...
- research-articleDecember 2023
Multi-level Data Integrity Model with Dual Immutable Digital Key Based Forensic Analysis in IoT Network
AbstractOver the last decade, the proliferation of Internet of Things (IoT) devices has risen dramatically. The exponential growth of IoT device ecosystems has led to a rise in the risks and cybercrimes associated with the IoT. Because of their ...
- short-paperNovember 2023
CYDRES: CYber Defense and REsilient System for securing grid-interactive efficient buildings
- Guowen Li,
- Zheng O'Neill,
- Jin Wen,
- Ojas Pradhan,
- Lingyu Ren,
- Teresa Wu,
- Veronica Adetola,
- K. Selcuk Candan,
- Qi Zhu
BuildSys '23: Proceedings of the 10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and TransportationPages 307–309https://doi.org/10.1145/3600100.3626273Smart buildings, especially Grid-interactive Efficient Buildings (GEBs), suffer from cyber-attacks and physical faults due to the integration of a large number of sensors and controls, connected devices, and associated communication networks. This study ...
- research-articleNovember 2023
WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS
AbstractCyber-attack is one of the alarming issues in today's era. Firewalls, Intrusion Detection Systems (IDSs), and other techniques are popularly applied to prevent those attacks. Intrusion Detection System (IDS) works as the watchdog to monitor the ...
- research-articleOctober 2023
Ransomware as a Predator: Modelling the Systemic Risk to Prey
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 4Article No.: 55, Pages 1–38https://doi.org/10.1145/3579648The accelerated pace with which companies, governments, and institutions embrace digital transformation is creating opportunities for economic prosperity, but also increases the threat landscape. Recent orchestrated cyber-attacks have revealed the ...
- research-articleSeptember 2023
Secure framework for IoT applications using Deep Learning in fog Computing
Journal of Information Security and Applications (JISA), Volume 77, Issue Chttps://doi.org/10.1016/j.jisa.2023.103569AbstractAn efficient offloading strategy provides a promising solution to latency-sensitive applications in a cloud fog environment, but the fog computing environment is not fully protected and fascinates the attackers due to its dynamic and ...
- research-articleAugust 2023
BBBC-DDRL: A hybrid big-bang big-crunch optimization and deliberated deep reinforced learning mechanisms for cyber-attack detection
Computers and Electrical Engineering (CENG), Volume 109, Issue PBhttps://doi.org/10.1016/j.compeleceng.2023.108773AbstractCurrently, the wireless networks are increasingly used in all kinds of applications due to their adaptability, flexibility, and easy-access. Without a predetermined architecture, wireless sensor networks are often deployed and unmanaged. Due to ...