2023
DOI: 10.1016/j.dcan.2022.09.010
|View full text |Cite
|
Sign up to set email alerts
|

Accurate threat hunting in industrial internet of things edge devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 31 publications
0
18
0
Order By: Relevance
“…FEC enables the secure and efficient sharing of data between multiple devices, improving the accuracy of predictive models and helping to prevent physical system failures. In addition, its scalability, flexibility, and ability to collaborate in real-time make it an invaluable tool for protecting critical infrastructure [38,39].…”
Section: Federated Learningmentioning
confidence: 99%
“…FEC enables the secure and efficient sharing of data between multiple devices, improving the accuracy of predictive models and helping to prevent physical system failures. In addition, its scalability, flexibility, and ability to collaborate in real-time make it an invaluable tool for protecting critical infrastructure [38,39].…”
Section: Federated Learningmentioning
confidence: 99%
“…Limited research has considered privacy-preserving issues when applying ML in blockchain-based environments [45], [46], [47]. These studies primarily…”
Section: Litreture Reviewmentioning
confidence: 99%
“…Firstly, it eliminates the need to share raw data among different parties, thus enhancing data privacy. By focusing on the exchange of local gradients of raw data, federated learning minimizes the risk of data breaches and unauthorized access to sensitive information [44], [45], [47].…”
Section: Privacy-preserving Threat Detection In a Blockchain-based En...mentioning
confidence: 99%
“…As a result of the advancements in these technologies, there are also additional cyber security threats and vulnerabilities that can be exploited to control on-field actuators, sensors, and autonomous vehicles such as tractors and drones [1,21]. The potential demonstrates the severity of these threats for exploits that could destroy an entire field of crops or greenhouse by altering environmental parameters [2,22,23].…”
Section: Introductionmentioning
confidence: 99%