Accès libre

A Study on Graph Theory Application and Efficacy of Cybersecurity Situational Awareness in Industrial IoT System

, , ,  et   
03 sept. 2024
À propos de cet article

Citez
Télécharger la couverture

Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in industry, 114, 103165. Search in Google Scholar

Ruan, Z. (2023, November). Blockchain technology for security issues and challenges in IoT. In 2023 International Conference on Computer Simulation and Modeling, Information Security (CSMIS) (pp. 572-580). IEEE. Search in Google Scholar

Zhou, W., Jia, Y., Peng, A., Zhang, Y., & Liu, P. (2018). The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of things Journal, 6(2), 1606-1616. Search in Google Scholar

Sengupta, J., Ruj, S., & Bit, S. D. (2020). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of network and computer applications, 149, 102481. Search in Google Scholar

Wolf, M., & Serpanos, D. (2017). Safety and security in cyber-physical systems and internet-of-things systems. Proceedings of the IEEE, 106(1), 9-20. Search in Google Scholar

Alguliyev, R., Imamverdiyev, Y., & Sukhostat, L. (2018). Cyber-physical systems and their security issues. Computers in Industry, 100, 212-223. Search in Google Scholar

Bedi, G., Venayagamoorthy, G. K., Singh, R., Brooks, R. R., & Wang, K. C. (2018). Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet of Things Journal, 5(2), 847-870.Rizvi, Search in Google Scholar

S., Kurtz, A., Pfeffer, J., & Rizvi, M. (2018, August). Securing the internet of things (IoT): A security taxonomy for IoT. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 163-168). IEEE. Search in Google Scholar

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. Search in Google Scholar

Lezzi, M., Lazoi, M., & Corallo, A. (2018). Cybersecurity for Industry 4.0 in the current literature: A reference framework. Computers in Industry, 103, 97-110. Search in Google Scholar

Sohal, A. S., Sandhu, R., Sood, S. K., & Chang, V. (2018). A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security, 74, 340-354. Search in Google Scholar

Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5), 8182-8201. Search in Google Scholar

Zolanvari, M., Teixeira, M. A., Gupta, L., Khan, K. M., & Jain, R. (2019). Machine learning-based network vulnerability analysis of industrial Internet of Things. IEEE internet of things journal, 6(4), 6822-6834. Search in Google Scholar

Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103-2115. Search in Google Scholar

Knapp, E. D. (2024). Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Elsevier. Search in Google Scholar

Tange, K., De Donno, M., Fafoutis, X., & Dragoni, N. (2020). A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials, 22(4), 2489-2520. Search in Google Scholar

Xu, H., Yu, W., Griffith, D., & Golmie, N. (2018). A survey on industrial Internet of Things: A cyber-physical systems perspective. Ieee access, 6, 78238-78259. Search in Google Scholar

Guruprakash Jayabalasamy,Cyril Pujol & Krithika Latha Bhaskaran.(2024).Application of Graph Theory for Blockchain Technologies.Mathematics(8). Search in Google Scholar

Francesca Arrigo,Desmond J. Higham,Vanni Noferini & Ryan Wood.(2024).Weighted Enumeration of Nonbacktracking Walks on Weighted Graphs.SIAM Journal on Matrix Analysis and Applications(1),397-418. Search in Google Scholar

Yang Ying Hui,Zhao Qi Yue,Chen Pei Ying,Geng Shi Jiao & Yuan Jiang Tao.(2024).Local discrimination of lattice states via adjacent matrix.Quantum Information Processing(6). Search in Google Scholar