4.6 Article

Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Discovering unknown advanced persistent threat using shared features mined by neural networks

Longkang Shang et al.

Summary: Detecting hidden C&C channel of unknown APT attacks by analyzing shared network flow features.

COMPUTER NETWORKS (2021)

Article Computer Science, Artificial Intelligence

Connection number of set pair analysis based TOPSIS method on intuitionistic fuzzy sets and their application to decision making

Kamal Kumar et al.

APPLIED INTELLIGENCE (2018)

Article Automation & Control Systems

The Meaningful Mixed Data TOPSIS (TOPSIS-MMD) Method and its Application in Supplier Selection

Sourour Aouadni et al.

STUDIES IN INFORMATICS AND CONTROL (2017)

Article Computer Science, Information Systems

A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram

Long Li et al.

IEEE ACCESS (2017)

Article Computer Science, Artificial Intelligence

An extension of fuzzy TOPSIS for a group decision making with an application to tehran stock exchange

Adel Hatami-Marbini et al.

APPLIED SOFT COMPUTING (2017)

Article Computer Science, Theory & Methods

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Shulan Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges

Anam Sajid et al.

IEEE ACCESS (2016)

Article Computer Science, Artificial Intelligence

Multi-criteria selection of a deep-water port in the Eastern Baltic Sea

Edmundas Kazimieras Zavadskas et al.

APPLIED SOFT COMPUTING (2015)

Article Computer Science, Hardware & Architecture

EMC: Emotion-Aware Mobile Cloud Computing in 5G

Min Chen et al.

IEEE NETWORK (2015)

Review Computer Science, Information Systems

Data Mining for the Internet of Things: Literature Review and Challenges

Feng Chen et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Computer Science, Artificial Intelligence

Construction projects selection and risk assessment by fuzzy AHP and fuzzy TOPSIS methodologies

Osman Taylan et al.

APPLIED SOFT COMPUTING (2014)

Article Engineering, Electrical & Electronic

Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions

Jiafu Wan et al.

IEEE COMMUNICATIONS MAGAZINE (2014)

Article Automation & Control Systems

Towards Robustness for Cyber-Physical Systems

Paulo Tabuada et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2014)

Article Automation & Control Systems

Supporting Heterogeneity in Cyber-Physical Systems Architectures

Akshay Rajhans et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2014)

Article Computer Science, Hardware & Architecture

Arbitrary-State Attribute-Based Encryption with Dynamic Membership

Chun-I Fan et al.

IEEE TRANSACTIONS ON COMPUTERS (2014)

Article Computer Science, Theory & Methods

Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking

Wenhai Sun et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

VCMIA: A Novel Architecture for Integrating Vehicular Cyber-Physical Systems and Mobile Cloud Computing

Jiafu Wan et al.

MOBILE NETWORKS & APPLICATIONS (2014)

Article Computer Science, Theory & Methods

Identity-based data storage in cloud computing

Jinguang Han et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Engineering, Electrical & Electronic

Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber-Physical Systems

Ayan Banerjee et al.

PROCEEDINGS OF THE IEEE (2012)

Article Engineering, Electrical & Electronic

Modeling Cyber-Physical Systems

Patricia Derler et al.

PROCEEDINGS OF THE IEEE (2012)

Article Engineering, Electrical & Electronic

Cyber-Physical System Security for the Electric Power Grid

Siddharth Sridhar et al.

PROCEEDINGS OF THE IEEE (2012)

Article Computer Science, Theory & Methods

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

Junbeom Hur et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)