|
|
|
Maksym W. Sitnicki, Nataliia Prykaziuk, Humeniuk Ludmila, Olena Pimenowa, Florin Imbrea, Laura ?muleac and Raul Pa?calau
The digitalization of the agricultural industry is manifested through the active use of innovative technologies in all its areas. Agribusiness owners have to constantly improve their security to meet new challenges. In this context, the existing cyber ri...
ver más
|
|
|
|
|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Fahim Sufi
In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from October...
ver más
|
|
|
|
|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Marcelo Fabian Guato Burgos, Jorge Morato and Fernanda Paulina Vizcaino Imacaña
This review can be used as a guiding reference to how studies of distinct types of smart grid abnormalities are approached.
|
|
|
|
|
|
|
Carlos Serôdio, Pedro Mestre, Jorge Cabral, Monica Gomes and Frederico Branco
In the context of Industry 4.0, this paper explores the vital role of advanced technologies, including Cyber?Physical Systems (CPS), Big Data, Internet of Things (IoT), digital twins, and Artificial Intelligence (AI), in enhancing data valorization and m...
ver más
|
|
|
|
|
|
|
Sharoug Alzaidy and Hamad Binsalleeh
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,...
ver más
|
|
|
|
|
|
|
Woo-Hyun Choi and Jongwon Kim
Industrial control systems (ICSs) play a crucial role in managing and monitoring critical processes across various industries, such as manufacturing, energy, and water treatment. The connection of equipment from various manufacturers, complex communicati...
ver más
|
|
|
|
|
|
|
Emin Aktan, Ivan Bartoli, Branko Gli?ic and Carlo Rainieri
This paper summarizes the lessons learned after several decades of exploring and applying Structural Health Monitoring (SHM) in operating bridge structures. The challenges in real-time imaging and processing of large amounts of sensor data at various ban...
ver más
|
|
|
|
|
|
|
Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective str...
ver más
|
|
|
|