An Internet of Medical Things Cyber Security Assessment Model (IoMT-CySAM). [PDF]
Jaidi F, Ksibi S, Bouhoula A.
europepmc +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Cyber security Enhancements with reinforcement learning: A zero-day vulnerabilityu identification perspective. [PDF]
Naeem MR +5 more
europepmc +1 more source
CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. [PDF]
Dart M, Ahmed M.
europepmc +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security. [PDF]
A R S, Katiravan J.
europepmc +1 more source
Cyber Security Threats to Educational Institutes: A Growing Concern for the New Era of Cybersecurity
Jawaid SA.
europepmc +1 more source
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. [PDF]
Yaacoub JA +3 more
europepmc +1 more source
From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia +3 more
wiley +1 more source
Implementation of a novel secured authentication protocol for cyber security applications. [PDF]
Suresh Kumar V +7 more
europepmc +1 more source

