2023
DOI: 10.1016/j.cose.2023.103383
|View full text |Cite
|
Sign up to set email alerts
|

A systematic literature review on wireless security testbeds in the cyber-physical realm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 75 publications
0
1
0
Order By: Relevance
“…The diversity of IoT devices, the massive data generated, the unstructured data processing, and data security are key challenges in the industrial cyber-physical cybersecurity realm [135,136]. Latif et al [137] developed a new architecture for IoT ecosystems, enhancing security and energy efficiency by integrating Software-Defined Networking and blockchain.…”
Section: Iot Applicationsmentioning
confidence: 99%
“…The diversity of IoT devices, the massive data generated, the unstructured data processing, and data security are key challenges in the industrial cyber-physical cybersecurity realm [135,136]. Latif et al [137] developed a new architecture for IoT ecosystems, enhancing security and energy efficiency by integrating Software-Defined Networking and blockchain.…”
Section: Iot Applicationsmentioning
confidence: 99%
“…PLCs are designed to perform control functions within harsh industrial environments while withstanding extreme temperatures, vibrations, and noise conditions, among others. In other words, PLCs are tasked with the real-time control and monitoring of machinery and processes, making them indispensable components in various sectors, including automotive manufacturing, water treatment facilities, oil refineries, and power plants [3,5,18,19]. Given the crucial role of PLCs in critical infrastructures, their security and reliability are decisive.…”
Section: Programmable Logic Controllersmentioning
confidence: 99%
“…Compared to, say, max pool, both backward and forwards, convolution is a significant leisure operation. Each training step is meant to become significantly longer if indeed the network is large [30][31][32][33][34][35].…”
Section: Cnn-based Feature Extractionmentioning
confidence: 99%