2020
DOI: 10.3390/computers9030074
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Cybersecurity issues constitute a key concern of today’s technology-based economies. Cybersecurity has become a core need for providing a sustainable and safe society to online users in cyberspace. Considering the rapid increase of technological implementations, it has turned into a global necessity in the attempt to adapt security countermeasures, whether direct or indirect, and prevent systems from cyberthreats. Identifying, characterizing, and classifying such threats and their sources is required for a sus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(7 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…Deception-based defenses are potent weapons that have been proven to work in various domains. Their efficacy is based on the fact that they are programmed to exploit key biases to appear realistic but misleading substitutes to the hidden reality [ 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 ]. As a result, one will require a thorough understanding of both offensive and defensive trickery to implement a perfect Deception strategy.…”
Section: Discussionmentioning
confidence: 99%
“…Deception-based defenses are potent weapons that have been proven to work in various domains. Their efficacy is based on the fact that they are programmed to exploit key biases to appear realistic but misleading substitutes to the hidden reality [ 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 ]. As a result, one will require a thorough understanding of both offensive and defensive trickery to implement a perfect Deception strategy.…”
Section: Discussionmentioning
confidence: 99%
“…In line with Jaiswal et al ( 2020 ), blockchain can be utilized effectively to facilitate electricity trade among user networks. Sadik et al ( 2020 ) posit that blockchain holds the key to the automation of smart grids due to its ability to facilitate energy trading, financing for renewables, energy billing, and metering processes. The technology also incites the joint operation of renewable sources with their energy storage units, the easy assessment of service charge, and the flexible and reliable payments of energy transactions through cryptography.…”
Section: Bibliometric Analysismentioning
confidence: 99%
“…In addition, machine learning techniques can well detect intrusion and cyberattacks in industrial IoT [ 50 ], which therefore can enhance sustainability and ensure uninterrupted services in smart cities by thwarting attacks and intrusion on respective IoT systems. However, there is a need for more research on machine learning implementation and model verification in terms of security and privacy [ 51 ].…”
Section: Iot-based Smart City Frameworkmentioning
confidence: 99%