2023
DOI: 10.3390/su15108076
|View full text |Cite
|
Sign up to set email alerts
|

Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System

Abstract: Online food security and industrial environments and sustainability-related industries are highly confidential and in urgent need for network traffic analysis to attain proper security information to avoid attacks from anywhere in the world. The integration of cutting-edge technology such as the Internet of things (IoT) has resulted in a gradual increase in the number of vulnerabilities that may be exploited in supervisory control and data acquisition (SCADA) systems. In this research, we present a network int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 67 publications
0
3
0
Order By: Relevance
“…Sensitive data can raise concerns about privacy, data security, and the possibility of unauthorized access [41]. A strategic response to these concerns involves implementing cybersecurity measures such as access control [42], encryption [43], data masking, and anonymization [44] using secure data transmission protocols [45]. Additionally, it is crucial to adhere to established security regulations when implementing such types of measures [41].…”
Section: Resultsmentioning
confidence: 99%
“…Sensitive data can raise concerns about privacy, data security, and the possibility of unauthorized access [41]. A strategic response to these concerns involves implementing cybersecurity measures such as access control [42], encryption [43], data masking, and anonymization [44] using secure data transmission protocols [45]. Additionally, it is crucial to adhere to established security regulations when implementing such types of measures [41].…”
Section: Resultsmentioning
confidence: 99%
“…The work of Alzahrani and Aldhyani [5] discusses the need for continuous adaptation and development in AI technologies. They argue that the changing landscape of cyber threats demands the constant evolution of AI solutions.…”
Section: Discussionmentioning
confidence: 99%
“…This methodology is justified by its comprehensive and realistic assessment of AI's ability to improve energy security [4]. Advanced data analysis instruments and machine learning algorithms have been used to process and examine large volumes of energy infrastructure data, enabling accurate assessments of AI systems' detection and response capabilities [5].…”
Section: Introductionmentioning
confidence: 99%
“…Currently, there is a sufficient number of scientific works devoted to improving the quality of anomaly detection and identification and the multiclass classification of attacks, which are both within the ACS and the Internet of Things. This is confirmed by works [5][6][7][8][9][10][11][12][13][14]. The authors are improving and inventing new approaches and detection standards aimed at improving accuracy, but the issue of further actions in the case of the timely detection of an anomaly is poorly studied.…”
Section: Introductionmentioning
confidence: 88%