Skip to Content

301 Results Found

  • Review
  • Open Access
109 Citations
50,446 Views
20 Pages

Businesses are reliant on data to survive in the competitive market, and data is constantly in danger of loss or theft. Loss of valuable data leads to negative consequences for both individuals and organizations. Cybersecurity is the process of prote...

  • Review
  • Open Access
14 Citations
12,968 Views
21 Pages

23 September 2024

Modern vehicles are increasingly interconnected through various communication channels, which requires secure access for authorized users, the protection of driver assistance and autonomous driving system data, and the assurance of data integrity aga...

  • Article
  • Open Access
3 Citations
3,176 Views
29 Pages

2 September 2025

Digital twins represent a transformative innovation for battery energy storage systems (BESS), offering real-time virtual replicas of physical batteries that enable accurate monitoring, predictive analytics, and advanced control strategies. These cap...

  • Feature Paper
  • Article
  • Open Access
6 Citations
2,894 Views
24 Pages

Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards

  • Sean Tsikteris,
  • Odyssefs Diamantopoulos Pantaleon and
  • Eirini Eleni Tsiropoulou

9 October 2024

This survey paper explores the cybersecurity certification requirements defined by the SunSpec Alliance for Distributed Energy Resource (DER) devices, focusing on aspects such as software updates, device communications, authentication mechanisms, dev...

  • Article
  • Open Access
1,654 Views
26 Pages

5 December 2025

This article presents a practical guide for developing a cybersecurity strategy that integrates COBIT 2019 with the ISO/IEC 27000 series of standards. Although COBIT 2019 provides strong frameworks for IT strategy and governance, it does not specific...

  • Article
  • Open Access
25 Citations
10,081 Views
21 Pages

The Cybersecurity Focus Area Maturity (CYSFAM) Model

  • Bilge Yigit Ozkan,
  • Sonny van Lingen and
  • Marco Spruit

13 February 2021

The cost of recovery after a cybersecurity attack is likely to be high and may result in the loss of business at the extremes. Evaluating the acquired cybersecurity capabilities and evolving them to a desired state in consideration of risks are inevi...

  • Review
  • Open Access
10 Citations
6,465 Views
32 Pages

Mapping of Industrial IoT to IEC 62443 Standards

  • Ivan Cindrić,
  • Marko Jurčević and
  • Tamara Hadjina

25 January 2025

The increasing adoption of the Industrial Internet of Things (IIoT) has led to significant improvements in operational efficiency but has also brought new challenges for cybersecurity. To address these challenges, a number of standards have been intr...

  • Review
  • Open Access
133 Citations
22,040 Views
30 Pages

Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap

  • Lubna Luxmi Dhirani,
  • Eddie Armstrong and
  • Thomas Newe

5 June 2021

Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected...

  • Review
  • Open Access
2,308 Views
28 Pages

1 December 2025

As humanoid robots move from controlled industrial environments into everyday human life, their safe integration is essential for societal acceptance and effective human–robot interaction (HRI). This scoping review examines engineering safety f...

  • Entry
  • Open Access
1 Citations
1,969 Views
37 Pages

Classifying Cyber Ranges: A Case-Based Analysis Using the UWF Cyber Range

  • Emily Miller,
  • Dustin Mink,
  • Peyton Spellings,
  • Sikha S. Bagui and
  • Subhash C. Bagui

To address the gaps in cyber range survey research, this entry develops and applies a structured classification taxonomy to support the comparison, evaluation, and design of cyber ranges. The entry will address the following question: What are the ob...

  • Review
  • Open Access
51 Citations
8,804 Views
42 Pages

A Comprehensive Review of Architecture, Communication, and Cybersecurity in Networked Microgrid Systems

  • Ahmed Aghmadi,
  • Hossam Hussein,
  • Ketulkumar Hitesh Polara and
  • Osama Mohammed

Networked microgrids (NMGs) are developing as a viable approach for integrating an expanding number of distributed energy resources (DERs) while improving energy system performance. NMGs, as compared to typical power systems, are constructed of many...

  • Review
  • Open Access
17 Citations
4,819 Views
27 Pages

28 January 2024

The effective operation of distributed energy sources relies significantly on the communication systems employed in microgrids. This article explores the fundamental communication requirements, structures, and protocols necessary to establish a secur...

  • Article
  • Open Access
1 Citations
1,654 Views
20 Pages

14 July 2025

The Industrial Internet of Things (IIoT) offers transformative potential for supply chain management by enabling automation, real-time monitoring, and predictive analytics. However, fragmented standardization, interoperability challenges, and cyberse...

  • Article
  • Open Access
22 Citations
6,728 Views
22 Pages

A Cloud Game-Based Educative Platform Architecture: The CyberScratch Project

  • Llanos Tobarra,
  • Alejandro Utrilla,
  • Antonio Robles-Gómez,
  • Rafael Pastor-Vargas and
  • Roberto Hernández

16 January 2021

The employment of modern technologies is widespread in our society, so the inclusion of practical activities for education has become essential and useful at the same time. These activities are more noticeable in Engineering, in areas such as cyberse...

  • Article
  • Open Access
281 Views
36 Pages

A Survey on IoT-Based Smart Electrical Systems: An Analysis of Standards, Security, and Applications

  • Chiara Matta,
  • Sara Pinna,
  • Samoel Ortu,
  • Francesco Parodo,
  • Daniele Giusto and
  • Matteo Anedda

12 February 2026

The rapid integration of Internet of Things (IoT) technologies is transforming electrical power systems into intelligent, interconnected, and data-driven infrastructures, enabling advanced monitoring, control, and optimization across the entire energ...

  • Proceeding Paper
  • Open Access
316 Views
14 Pages

14 January 2026

The present literature review identifies substantial research and applied potential in the combined utilization of internationally recognized information security standards, Bayesian networks, and AI-based assistants to enhance cyber resilience in Un...

  • Article
  • Open Access
1,927 Views
28 Pages

18 September 2025

UAVThreatBench introduces the first structured benchmark for evaluating large language models in cybersecurity threat identification for unmanned aerial vehicles operating within industrial indoor settings, aligned with the European Radio Equipment D...

  • Article
  • Open Access
18 Citations
4,709 Views
23 Pages

Enhancing Security for IoT-Based Smart Renewable Energy Remote Monitoring Systems

  • Alexandre Rekeraho,
  • Daniel Tudor Cotfas,
  • Petru Adrian Cotfas,
  • Emmanuel Tuyishime,
  • Titus Constantin Balan and
  • Rebecca Acheampong

13 February 2024

Renewable energy is an essential solution for addressing climate change, providing sustainable options that are vital for a more environmentally friendly future. Integrating information technology (IT) into renewable energy systems has driven remarka...

  • Article
  • Open Access
16 Citations
4,584 Views
26 Pages

Towards Optimized Security Attributes for IoT Devices in Smart Agriculture Based on the IEC 62443 Security Standard

  • Abdelkader Magdy Shaaban,
  • Sebastian Chlup,
  • Nahla El-Araby and
  • Christoph Schmittner

2 June 2022

Implementing applicable security measures into system engineering applications is still one of the most challenging processes in building secure infrastructure. This process needs to consider a variety of security attributes to support securing syste...

  • Review
  • Open Access
19 Citations
6,000 Views
40 Pages

On Wide-Area IoT Networks, Lightweight Security and Their Applications—A Practical Review

  • Ana Goulart,
  • Anitha Chennamaneni,
  • Damiano Torre,
  • Byul Hur and
  • Fadhil Y. Al-Aboosi

The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze collected data over the Internet. IoT devices are located in diverse environments and support many applications. To protect IoT systems from cyber threats,...

  • Article
  • Open Access
12 Citations
10,119 Views
28 Pages

17 January 2024

In today’s technology-centric business environment, where organizations encounter numerous cyber threats, effective IT risk management is crucial. An objective risk assessment—based on information relating to business requirements, human...

  • Article
  • Open Access
16 Citations
8,034 Views
43 Pages

IoT Security Risk Management Strategy Reference Model (IoTSRM2)

  • Traian Mihai Popescu,
  • Alina Madalina Popescu and
  • Gabriela Prostean

Nowadays, Internet of Things (IoT) adoptions are burgeoning and deemed the lynchpin towards achieving ubiquitous connectivity. In this context, defining and leveraging robust IoT security risk management strategies are paramount for secure IoT adopti...

  • Review
  • Open Access
243 Citations
180,673 Views
18 Pages

Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review

  • Lubna Luxmi Dhirani,
  • Noorain Mukhtiar,
  • Bhawani Shankar Chowdhry and
  • Thomas Newe

19 January 2023

Industry 5.0 is projected to be an exemplary improvement in digital transformation allowing for mass customization and production efficiencies using emerging technologies such as universal machines, autonomous and self-driving robots, self-healing ne...

  • Review
  • Open Access
1,409 Views
34 Pages

Cybersecurity in Smart Grids: A Domain-Centric Review

  • Sahithi Angara,
  • Laxima Niure Kandel and
  • Raju Dhakal

14 December 2025

The modern power grid is considered a Smart Grid (SG) when it relies extensively on technologies that integrate traditional power infrastructure with Information and Communication Technologies (ICTs). The dependence on Internet of Things (IoT)-based...

  • Article
  • Open Access
279 Views
29 Pages

14 February 2026

The S-100 standard for Electronic Chart Display and Information Systems (ECDIS) uses Lua scripts to render electronic charts, yet lacks security specifications for script execution. This paper evaluates automated Static Application Security Testing (...

  • Feature Paper
  • Article
  • Open Access
32 Citations
6,259 Views
36 Pages

Security Assessment of Agriculture IoT (AIoT) Applications

  • Erwin Kristen,
  • Reinhard Kloibhofer,
  • Vicente Hernández Díaz and
  • Pedro Castillejo

23 June 2021

Cybersecurity is an important field in our digital world. It protects computer systems and communication networks against theft or sabotage of information to guarantee trouble-free operation in a trustworthy working environment. This article gives an...

  • Article
  • Open Access
16 Citations
7,511 Views
35 Pages

Digitalisation and Cybersecurity: Towards an Operational Framework

  • Bilgin Metin,
  • Fatma Gül Özhan and
  • Martin Wynn

28 October 2024

As businesses increasingly adopt digital processes and solutions to enhance efficiency and productivity, they face heightened cybersecurity threats. Through a systematic literature review and concept development, this article examines the intersectio...

  • Article
  • Open Access
7 Citations
5,535 Views
15 Pages

Challenges in Maritime Cybersecurity Training and Compliance

  • Divine C. Chupkemi and
  • Konstantinos Mersinas

15 October 2024

The implementation of cybersecurity standards and directives in the maritime sector plays a crucial role in protecting critical maritime infrastructures from cyber threats. The level of protection depends heavily on humans. However, the effectiveness...

  • Article
  • Open Access
6 Citations
7,012 Views
20 Pages

An Evaluation Framework for Cybersecurity Maturity Aligned with the NIST CSF

  • Luís Bernardo,
  • Silvestre Malta and
  • João Magalhães

Cybersecurity is critical for mitigating the economic and reputational impacts of cyberattacks. To address these risks, frameworks like the NIST Cybersecurity Framework (NIST CSF) provide standardized guidelines for managing and reducing cybersecurit...

  • Article
  • Open Access
11 Citations
6,727 Views
17 Pages

25 January 2023

As industries in various sectors increasingly adopt model-based systems engineering (MBSE) for system lifecycle design and development, engineers can manage and describe systems of higher complexity than ever before. This is especially true for the f...

  • Article
  • Open Access
15 Citations
4,954 Views
22 Pages

Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid

  • Matthew Boeding,
  • Kelly Boswell,
  • Michael Hempel,
  • Hamid Sharif,
  • Juan Lopez and
  • Kalyan Perumalla

19 November 2022

The convergence of Information Technologies and Operational Technology systems in industrial networks presents many challenges related to availability, integrity, and confidentiality. In this paper, we evaluate the various cybersecurity risks in indu...

  • Article
  • Open Access
9 Citations
7,510 Views
24 Pages

Understanding Local Government Cybersecurity Policy: A Concept Map and Framework

  • Sk Tahsin Hossain,
  • Tan Yigitcanlar,
  • Kien Nguyen and
  • Yue Xu

10 June 2024

Cybersecurity is a crucial concern for local governments as they serve as the primary interface between public and government services, managing sensitive data and critical infrastructure. While technical safeguards are integral to cybersecurity, the...

  • Review
  • Open Access
22 Citations
6,061 Views
43 Pages

Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives

  • Chidambar Rao Bhukya,
  • Prabhat Thakur,
  • Bhavesh Raju Mudhivarthi and
  • Ghanshyam Singh

27 September 2023

The “Internet-of-Medical-Vehicles (IOMV)” is one of the special applications of the Internet of Things resulting from combining connected healthcare and connected vehicles. As the IOMV communicates with a variety of networks along its travel path, it...

  • Perspective
  • Open Access
7 Citations
7,599 Views
18 Pages

Mathematical Approaches Transform Cybersecurity from Protoscience to Science

  • Ivan Trenchev,
  • Willian Dimitrov,
  • Georgi Dimitrov,
  • Tanya Ostrovska and
  • Miglena Trencheva

26 May 2023

The area of cybersecurity problems has reached the stage of becoming a science. This raises questions about the connection between the mathematical theories used in cybersecurity research and their relation to the methodology for experiments and conc...

  • Article
  • Open Access
3 Citations
5,928 Views
31 Pages

Threat Analysis and Risk Assessment (TARA) Analysis of an Autonomous Emergency Braking (AEB) System

  • Umberto Della Monica,
  • Kimberly-Annalena Munjal,
  • Mark Paul Tamas,
  • Biagio Boi,
  • Christian Esposito and
  • Rahamatullah Khondoker

29 January 2025

To ensure security and stable quality, deeper cybersecurity evaluations are essential for the development of safety features and functionalities in vehicles. Among these, the AEB system is the most relevant. This research presents a comprehensive TAR...

  • Article
  • Open Access
1 Citations
3,198 Views
18 Pages

As cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories ha...

  • Article
  • Open Access
4 Citations
4,783 Views
40 Pages

Cybersecurity Conceptual Framework Applied to Edge Computing and Internet of Things Environments

  • Ricardo Emmanuel Reyes-Acosta,
  • Ricardo Mendoza-González,
  • Edgar Oswaldo Diaz,
  • Miguel Vargas Martin,
  • Francisco Javier Luna Rosas,
  • Julio César Martínez Romo and
  • Alfredo Mendoza-González

The objective of this research was to propose a conceptual cybersecurity framework aimed at guiding developers in generating and implementing technological solutions for Edge Computing and Internet of Things (IoT) environments. The framework integrat...

  • Article
  • Open Access
33 Citations
8,154 Views
21 Pages

Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System

  • Abdul Razaque,
  • Abrar Al Ajlan,
  • Noussaiba Melaoune,
  • Munif Alotaibi,
  • Bandar Alotaibi,
  • Issabekov Dias,
  • Ammar Oad,
  • Salim Hariri and
  • Chenglin Zhao

26 August 2021

Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity gu...

  • Article
  • Open Access
3 Citations
3,698 Views
28 Pages

While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these practices must be implemented in organizations by people with the necessary skills and knowledge and be supporte...

  • Proceeding Paper
  • Open Access
1,575 Views
8 Pages

Constructing Cyber Resilience: A Focus on Cybersecurity Measures in the South African Construction Sector

  • Seyi Stephen,
  • Clinton Aigbavboa,
  • Ayodeji Oke,
  • Opeoluwa Akinradewo and
  • Ayobami Idowu

In addressing the challenges of cyber threats in the South African construction sector, the study employed a quantitative methodology involving a questionnaire retrieved from 86 of the study’s respondents. It employed tools like mean item score...

  • Article
  • Open Access
7 Citations
4,931 Views
26 Pages

24 June 2021

The automotive sector is facing challenges in terms of the requirements for guaranteeing the safety and security of cars. In respect of the engineering process, it is challenging to incorporate functional safety, safety of the intended functionality,...

  • Article
  • Open Access
13 Citations
6,671 Views
31 Pages

Risk-Based Cybersecurity Compliance Assessment System (RC2AS)

  • Afnan Alfaadhel,
  • Iman Almomani and
  • Mohanned Ahmed

17 May 2023

Cybersecurity attacks are still causing significant threats to individuals and organizations, affecting almost all aspects of life. Therefore, many countries worldwide try to overcome this by introducing and applying cybersecurity regularity framewor...

  • Feature Paper
  • Article
  • Open Access
764 Views
25 Pages

Photo-Set: A Proposed Dataset and Benchmark for Physics-Based Cybersecurity Monitoring in Photovoltaic Systems

  • Afroz Mokarim,
  • Giovanni Battista Gaggero,
  • Giulio Ferro,
  • Michela Robba,
  • Paola Girdinio and
  • Mario Marchese

9 October 2025

Modern photovoltaic (PV) systems face increasing cybersecurity threats due to their integration with smart grid infrastructure. While previous research has identified vulnerabilities, the lack of standardized datasets has hindered the development and...

  • Article
  • Open Access
1 Citations
4,126 Views
27 Pages

Cybersecurity Practices and Supply Chain Performance: The Case of Jordanian Banks

  • Saleh Fahed Al-Khatib,
  • Yara Yousef Ibrahim and
  • Mohammad Alnadi

24 December 2024

This study explores the impact of cybersecurity practices on supply chain performance in the Jordanian banking sector. A survey was used to obtain data from managers and customers. Data from 40 managers’ and 250 digital banking customers’...

  • Article
  • Open Access
19 Citations
7,146 Views
30 Pages

Towards a Cyber-Physical Range for the Integrated Navigation System (INS)

  • Aybars Oruc,
  • Vasileios Gkioulos and
  • Sokratis Katsikas

The e-navigation concept was introduced by the IMO to enhance berth-to-berth navigation towards enhancing environmental protection, and safety and security at sea by leveraging technological advancements. Even though a number of e-navigation testbeds...

  • Article
  • Open Access
11 Citations
3,971 Views
17 Pages

Automated Cybersecurity Tester for IEC61850-Based Digital Substations

  • Junho Hong,
  • Tai-Jin Song,
  • Hyojong Lee and
  • Aydin Zaboli

22 October 2022

Power substations are the crucial nodes of an interconnected grid, serving as the points where power is transferred from the transmission/distribution grids to the loads. However, interconnected cyberphysical systems and communication-based operation...

  • Article
  • Open Access
12 Citations
7,284 Views
23 Pages

22 February 2024

Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguous...

  • Review
  • Open Access
51 Citations
8,542 Views
20 Pages

Cybersecurity of Microgrid: State-of-the-Art Review and Possible Directions of Future Research

  • Norziana Jamil,
  • Qais Saif Qassim,
  • Farah Aqilah Bohani,
  • Muhamad Mansor and
  • Vigna Kumaran Ramachandaramurthy

20 October 2021

The infrastructure of and processes involved in a microgrid electrical system require advanced technology to facilitate connection among its various components in order to provide the intelligence and automation that can benefit users. As a consequen...

  • Article
  • Open Access
5 Citations
4,575 Views
18 Pages

Cybersecurity Risk Assessments within Critical Infrastructure Social Networks

  • Alimbubi Aktayeva,
  • Yerkhan Makatov,
  • Akku Kubigenova Tulegenovna,
  • Aibek Dautov,
  • Rozamgul Niyazova,
  • Maxud Zhamankarin and
  • Sergey Khan

19 October 2023

Cybersecurity social networking is a new scientific and engineering discipline that was interdisciplinary in its early days, but is now transdisciplinary. The issues of reviewing and analyzing of principal tasks related to information collection, mon...

  • Review
  • Open Access
5 Citations
8,975 Views
24 Pages

A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America

  • Omar Flor-Unda,
  • Freddy Simbaña,
  • Xavier Larriva-Novo,
  • Ángel Acuña,
  • Rolando Tipán and
  • Patricia Acosta-Vargas

Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private servic...

of 7