2019
DOI: 10.1007/978-3-030-16837-7_10
|View full text |Cite
|
Sign up to set email alerts
|

Some Specific Examples of Attacks on Information Systems and Smart Cities Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Attack Investigation. Sophisticated attacks disguise their behavior to evade the monitoring of intrusion detection systems when infiltrating information systems [28]. Provenance analysis is commonly used to investigate attacks and uncover hidden attack behaviors at the system layer.…”
Section: Related Workmentioning
confidence: 99%
“…Attack Investigation. Sophisticated attacks disguise their behavior to evade the monitoring of intrusion detection systems when infiltrating information systems [28]. Provenance analysis is commonly used to investigate attacks and uncover hidden attack behaviors at the system layer.…”
Section: Related Workmentioning
confidence: 99%
“…The growth of Artificial Intelligence has been significant within several industrial sectors and is anticipated to grow even more in the upcoming days (Saračević et al, 2019). Since, these commercial organizations are looking to adopt the features of artificial intelligence, robotics, and machine learning, it is necessary to stay aware of the laws and regulations associated with these technologies.…”
Section: Legal Regulations On Artificial Intelligencementioning
confidence: 99%
“…Also, a unified IoT (Internet of Things) framework and zerotouch networks encourage factories to implement IIoT to transform into Industry 4.0 capability. These technologies are constantly improving machine-machine and human-machine communication and data transmission (Saračević et al, 2019). The innovations in this area increase speed, improve security and efficiency, and reduce network connectivity costs.…”
Section: Networking and Connectivitymentioning
confidence: 99%