ListarGrupos de investigación por tema "Cybersecurity"
Mostrando ítems 1-9 de 9
-
A First Approach to Authentication Based on Artificial Intelligence for Touch-Screen Devices
(MDPI AG, 2020-08-18)[Abstract] Most authentication schemes follow a classical approach, where the users are authenticated only once at the beginning of their sessions. Therefore, it is not possible to verify the legitimate use of such a ... -
A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport
(Wiley, 2024)[Abstract]: One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems. MitM attacks on internet of things systems ... -
A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry
(IEEE, 2019)[Absctract]: In the last century, the automotive industry has arguably transformed society, being one of the most complex, sophisticated, and technologically advanced industries, with innovations ranging from the hybrid, ... -
A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories
(IEEE, 2019)[Absctract]: Industry 4.0 is a concept devised for improving the way modern factories operate through the use of some of the latest technologies, like the ones used for creating the Industrial Internet of Things (IIoT), ... -
Development of an Intelligent Classifier Model for Denial of Service Attack Detection
(UNIR, 2023)[Abstract] The prevalence of Internet of Things (IoT) systems deployment is increasing across various domains, from residential to industrial settings. These systems are typically characterized by their modest computationa ... -
Emerging Paradigms and Architectures for Industry 4.0 Applications
(Multidisciplinary Digital Publishing Institute (MDPI), 2022)[Abstract]: The Fourth Industrial Revolution (4IR), called “Industry 4.0” in Europe, “Industrial Internet of Things” in North America, or “Made in China 2025” in China, blurs the boundaries between the physical, digital ... -
Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
(MDPI AG, 2020-05-27)[Abstract] Shodan is a search engine for exploring the Internet and thus finding connected devices. Its main use is to provide a tool for cybersecurity researchers and developers to detect vulnerable Internet-connected ... -
Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks
(Institute of Electrical and Electronics Engineers, 2020-01-23)[Abstract] Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, ... -
Use Case Based Blended Teaching of IIoT Cybersecurity in the Industry 4.0 Era
(MDPI AG, 2020-08-13)[Abstract] Industry 4.0 and Industrial Internet of Things (IIoT) are paradigms that are driving current industrial revolution by connecting to the Internet industrial machinery, management tools or products so as to control ...