Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
An Internet of Medical Things Cyber Security Assessment Model (IoMT-CySAM). [PDF]
Jaidi F, Ksibi S, Bouhoula A.
europepmc +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
Cyber security Enhancements with reinforcement learning: A zero-day vulnerabilityu identification perspective. [PDF]
Naeem MR +5 more
europepmc +1 more source
CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. [PDF]
Dart M, Ahmed M.
europepmc +1 more source
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security. [PDF]
A R S, Katiravan J.
europepmc +1 more source
Cyber Security Threats to Educational Institutes: A Growing Concern for the New Era of Cybersecurity
Jawaid SA.
europepmc +1 more source
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. [PDF]
Yaacoub JA +3 more
europepmc +1 more source
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li +5 more
wiley +1 more source

