This work is licensed under the Creative Commons Attribution 4.0 International License.
Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in industry, 114, 103165.Search in Google Scholar
Ruan, Z. (2023, November). Blockchain technology for security issues and challenges in IoT. In 2023 International Conference on Computer Simulation and Modeling, Information Security (CSMIS) (pp. 572-580). IEEE.Search in Google Scholar
Zhou, W., Jia, Y., Peng, A., Zhang, Y., & Liu, P. (2018). The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of things Journal, 6(2), 1606-1616.Search in Google Scholar
Sengupta, J., Ruj, S., & Bit, S. D. (2020). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of network and computer applications, 149, 102481.Search in Google Scholar
Wolf, M., & Serpanos, D. (2017). Safety and security in cyber-physical systems and internet-of-things systems. Proceedings of the IEEE, 106(1), 9-20.Search in Google Scholar
Alguliyev, R., Imamverdiyev, Y., & Sukhostat, L. (2018). Cyber-physical systems and their security issues. Computers in Industry, 100, 212-223.Search in Google Scholar
Bedi, G., Venayagamoorthy, G. K., Singh, R., Brooks, R. R., & Wang, K. C. (2018). Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet of Things Journal, 5(2), 847-870.Rizvi,Search in Google Scholar
S., Kurtz, A., Pfeffer, J., & Rizvi, M. (2018, August). Securing the internet of things (IoT): A security taxonomy for IoT. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 163-168). IEEE.Search in Google Scholar
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97.Search in Google Scholar
Lezzi, M., Lazoi, M., & Corallo, A. (2018). Cybersecurity for Industry 4.0 in the current literature: A reference framework. Computers in Industry, 103, 97-110.Search in Google Scholar
Sohal, A. S., Sandhu, R., Sood, S. K., & Chang, V. (2018). A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security, 74, 340-354.Search in Google Scholar
Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), 8182-8201.Search in Google Scholar
Zolanvari, M., Teixeira, M. A., Gupta, L., Khan, K. M., & Jain, R. (2019). Machine learning-based network vulnerability analysis of industrial Internet of Things. IEEE internet of things journal, 6(4), 6822-6834.Search in Google Scholar
Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103-2115.Search in Google Scholar
Knapp, E. D. (2024). Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Elsevier.Search in Google Scholar
Tange, K., De Donno, M., Fafoutis, X., & Dragoni, N. (2020). A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials, 22(4), 2489-2520.Search in Google Scholar
Xu, H., Yu, W., Griffith, D., & Golmie, N. (2018). A survey on industrial Internet of Things: A cyber-physical systems perspective. Ieee access, 6, 78238-78259.Search in Google Scholar
Guruprakash Jayabalasamy,Cyril Pujol & Krithika Latha Bhaskaran.(2024).Application of Graph Theory for Blockchain Technologies.Mathematics(8).Search in Google Scholar
Francesca Arrigo,Desmond J. Higham,Vanni Noferini & Ryan Wood.(2024).Weighted Enumeration of Nonbacktracking Walks on Weighted Graphs.SIAM Journal on Matrix Analysis and Applications(1),397-418.Search in Google Scholar
Yang Ying Hui,Zhao Qi Yue,Chen Pei Ying,Geng Shi Jiao & Yuan Jiang Tao.(2024).Local discrimination of lattice states via adjacent matrix.Quantum Information Processing(6).Search in Google Scholar