Top Research Papers on Cyber Security
Explore our curated collection of top research papers on Cyber Security. Dive into the latest insights and advancements in protecting information systems, networks, and data from cyber threats. This resource is perfect for academics, professionals, and anyone with an interest in understanding the evolving domain of cyber security.
Looking for research-backed answers?Try AI Search
Cybersecurity of Industrial Cyber-Physical Systems: A Review
181 Citations 2022Hakan Kayan, Matthew Nunes, Omer Rana + 2 more
ACM Computing Surveys
A multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents and is identified the general shortcomings and highlight the points that cause a gap in existing literature while defining future research directions.
Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity
167 Citations 2023Muhammad Fakhrul Safitra, Muharman Lubis, Hanif Fakhrurroja
Sustainability
A comprehensive framework that responds to the complexities of modern cyber threats and provides guidance to organizations to enhance their resilience, with a primary focus on the integration of capabilities with resilience.
Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks
127 Citations 2020Nïkhil Gupta, Akash Tiwari, Satish Bukkapatnam + 1 more
IEEE Access
It is argued that the traditional cybersecurity methods need to evolve to address the new class of attack vectors that threaten the AM supply chain and also the nature of existing solutions that help in addressing the risks and attack threats are discussed.
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
115 Citations 2023Saqib Saeed, Sarah A. Suayyid, Manal S. Al-Ghamdi + 2 more
Sensors
A comprehensive framework for implementing CTI in organizations is proposed, comprised of a knowledge base, detection models, and visualization dashboards, which provides insight for future studies, such as how organizations can tailor their approach to their needs and resources.
Cyber-Security of Smart Microgrids: A Survey
135 Citations 2020Farzam Nejabatkhah, Yunwei Li, Hao Liang + 1 more
Energies
Since a false data injection (FDI) attack that compromises the data integrity in the cyber/communication network is one of the most challenging threats for smart microgrids, it is investigated in detail in this paper.
The recent trends in cyber security: A review
141 Citations 2021Jagpreet Kaur, K. R. Ramkumar
Journal of King Saud University - Computer and Information Sciences
The new generation attacks are discussed and documented in detail, the advanced key management schemes are depicted and the quantum cryptography is discussed with its merits and future scope of the same.
A Systematic Literature Review on the Cyber Security
121 Citations 2021Firoj Parwej, Syed Qamar Abbas, Jai Pratap Dixit + 2 more
International Journal of Scientific Research and Management (IJSRM)
A thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyberSecurity tools, and cyber security difficulties is conducted.
Deep Reinforcement Learning for Cyber Security
490 Citations 2021Thanh Thi Nguyen, Vijay Janapa Reddi
IEEE Transactions on Neural Networks and Learning Systems
This article presents a survey of DRL approaches developed for cyber security, including DRL-based security methods for cyber–physical systems, autonomous intrusion detection techniques, and multiagent D RL-based game theory simulations for defense strategies against cyberattacks.
A Survey on Cyber–Physical Systems Security
137 Citations 2023Zhenhua Yu, Hongxia Gao, Xuya Cong + 2 more
IEEE Internet of Things Journal
Through this in-depth review, this article attempts to summarize the current security threats to CPSs and the state-of-the-art security means to provide researchers with a comprehensive overview.
Cyber Security Threats on Digital Banking
146 Citations 2022Haitham M. Alzoubi, Taher M. Ghazal, Mohammad Kamrul Hasan + 4 more
journal unavailable
The research has found that cyber security threats are a major problem in digital banking and has used a theoretical analysis method involving secondary information sources.
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
378 Citations 2021Jun Zhang, Lei Pan, Qing‐Long Han + 3 more
IEEE/CAA Journal of Automatica Sinica
A holistic view of recently proposed DL solutions is provided to cyber attack detection in the CPS context and great potential to detect cyber attacks against CPS through DL modules is indicated.
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
218 Citations 2023Nan Sun, Ming Ding, Jiaojiao Jiang + 4 more
IEEE Communications Surveys & Tutorials
A taxonomy is provided to summarize the studies on CTI mining based on the intended purposes and a comprehensive review of the current state-of-the-art is presented.
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
639 Citations 2021Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse + 4 more
Computers & Security
The analysis shows how following what appeared to be large gaps between the initial outbreak of the pandemic in China and the first COVID-19 related cyber-attack, attacks steadily became much more prevalent to the point that on some days, three or four unique cyber-attacks were being reported.
Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network
106 Citations 2020Sudhakar Sengan, V. Subramaniyaswamy, S. K. Sreenivasan Nair + 3 more
Future Generation Computer Systems
A context-specific safety setup for conventional cyber–physical systems for smart cities proposed for HSCCA is recommended and a few prospective areas for exploring and their impact are put forth.
In-Vehicle Communication Cyber Security: Challenges and Solutions
117 Citations 2022Rajkumar Singh Rathore, Chaminda Hewage, Omprakash Kaiwartya + 1 more
Sensors
This paper critically explores the literature on cyber security for in-vehicle communication focusing on technical architecture, methodologies, challenges, and possible solutions and proposes a multi-layer secure framework as a protocol and use case-independent in-Vehicle communication solution.
A Review of Cyber–Physical Security for Photovoltaic Systems
130 Citations 2021Jin Ye, Annarita Giani, Ahmed Elasser + 17 more
IEEE Journal of Emerging and Selected Topics in Power Electronics
The challenges and a future vision of the cyber–physical security of photovoltaic (PV) systems are discussed from a firmware, network, PV converter controls, and grid security perspective and the blockchain technology that addresses cyberattacks in software and cybernetworks is described.
Cyber Security of Smart Grid: Attacks and Defenses
105 Citations 2020Tu N. Nguyen, Bing-Hong Liu, Nam P. Nguyen + 1 more
journal unavailable
The objective of this research is to provide an efficient method to identify critical components in the system by considering a realistic attack scenario, namely the Maximum-Impact through Critical-Line with Limited Budget (MICLLB) problem.
A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems
122 Citations 2020Athira Mohan, Nader Meskin, Hasan Mehrjerdi
Energies
A comprehensive review of the cyber-security of the LFC mechanism in the power system is presented, including the identification of attack points of different configurations of theLFC system, discussion of the attack strategies, formulation of various attack models, and a brief review ofThe existing detection and defense mechanisms against cyber-attacks on LFC.
A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
650 Citations 2021Yuchong Li, Qinghui Liu
Energy Reports
The aim of this study is to survey and comprehensively review the standard advances presented in the field of cyber security and to investigate the challenges, weaknesses and strengths of the proposed methods.
Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure
110 Citations 2021Camélia Radu, Nadia Smaïli
Journal of Business Ethics
The findings support regulators in their efforts to increase women’s representation on boards by providing empirical evidence of better outcomes with this type of board composition.
A Review on Cybersecurity Analysis, Attack Detection, and Attack Defense Methods in Cyber-physical Power Systems
135 Citations 2023Dajun Du, Minggao Zhu, Xue Li + 4 more
Journal of Modern Power Systems and Clean Energy
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and challenges. The timely detection and defense are of crucial importance for safe and reliable operation of cyber-physical power systems (CPPSs). This paper presents a comprehensive review of some of the latest attack detection and defense strategies. Firstly, the vulnerabilities brought by some new information and communication technologies (ICTs) are analyzed, and their impacts on the security of CPPSs are discussed. Various mali...
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations
301 Citations 2022Mohammad Kamrul Hasan, A.K.M. Ahasan Habib, Zarina Shukur + 3 more
Journal of Network and Computer Applications
The smart grid (SG) system is an intelligent technology that facilitates the integration of green technology and environmental aspects, which is a two-way communication system for information transformation, power generation, and distribution. The development and application of communication technology in the traditional power system deployed the SG cyber-physical system. The SG systems have a complex architecture that contains critical devices and Internet of Things (IoT)-based infrastructures. These critical infrastructures and devices are faced with cyber-attacks. Therefore, the SG systems ...
Resilience in healthcare systems: Cyber security and digital transformation
142 Citations 2022Alexeis García-Pérez, Juan‐Gabriel Cegarra‐Navarro, Mark Paul Sallos + 2 more
Technovation
The research found that a balanced base of cyber security knowledge development, uncertainty management, and consideration for the sector’s high levels of systemic and organisational interdependence are essential for its digital resilience and for the sustainability of its digital transformation efforts.
Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications
340 Citations 2020Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, M. Premkumar + 1 more
IEEE Access
A comprehensive review of different modelling, simulation, and analysis methods and different types of cyber-attacks, cybersecurity measures for modern CPPS is explored in this paper.
Cyber Security Awareness, Knowledge and Behavior: A Comparative Study
382 Citations 2020Moti Zwilling, Galit Klien, Dušan Lesjak + 3 more
Journal of Computer Information Systems
Results show that internet users possess adequate cyber threat awareness but apply only minimal protective measures usually relatively common and simple ones, and that higher cyber knowledge is connected to the level of cyber awareness, beyond the differences in respondent country or gender.
Blockchain technology in the future of business cyber security and accounting
266 Citations 2020Sebahattin Demirkan, Irem Demirkan, Andrew McKee
Journal of Management Analytics
This study looks into the current, and potential uses of Blockchain technology in business, specifically in Accounting and in cybersecurity, as well as relating Blockchain uses to current concerns within cyberspace.
Applied Artificial Intelligence as Event Horizon Of Cyber Security
128 Citations 2022Atif Ali, Arif Wicaksono Septyanto, Iqra Ishtiaq Chaudhary + 3 more
2022 International Conference on Business Analytics for Technology and Security (ICBATS)
In this paper, AI security trends and data breaches caused by malicious attacks are discussed.
Cyber-security on smart grid: Threats and potential solutions
662 Citations 2020Muhammed Zekeriya Gündüz, Resul Daş
Computer Networks
The threats and potential solutions of the IoT-based smart grid are analyzed and a deep understanding of cyber-security vulnerabilities and solutions are supply and a guide on future research directions for cyber- security in smart grid applications is given.
Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
287 Citations 2020Mamoona Humayun, Mahmood Niazi, N. Z. Jhanjhi + 2 more
Arabian Journal for Science and Engineering
There is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it.
Cyber security: State of the art, challenges and future directions
223 Citations 2023Wasyihun Sema Admass, Yirga Yayeh Munaye, Abebe Diro
Cyber Security and Applications
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every individual and organization faces continually shifting cyber threats. This article provides an overview of the state of the art in cyber security, challenges, and tactics, current conditions, and global trends of cyber security. To stay ahead of the curve in cyber security, we conducted a systematic review to uncover the latest trends, challen...
A Moving Target Defense for Securing Cyber-Physical Systems
110 Citations 2020Paul Griffioen, Sean Weerakkody, Bruno Sinopoli
IEEE Transactions on Automatic Control
This article considers the design and analysis of multiple moving target defenses for recognizing and isolating attacks on cyber-physical systems and proposes the use of sensor nonlinearities to enhance the effectiveness of the moving target defense.
A Systematic Review of the State of Cyber-Security in Water Systems
111 Citations 2021Nilufer Tuptuk, Peter Hazell, Jeremy Watson + 1 more
Water
The state of the cyber-security research that is focused on improving the security of the water supply and wastewater collection and treatment systems that form part of the critical national infrastructure is reviewed.
A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)
309 Citations 2021Xiaoqiang Sun, F. Richard Yu, Peng Zhang
IEEE Transactions on Intelligent Transportation Systems
This paper describes and analyzes up-to-date corresponding defense strategies for securing CAVs and concludes several available cyber-security and safety standards of CAVs, which are helpful for the practical application ofCAVs.
Riskio: A Serious Game for Cyber Security Awareness and Education
207 Citations 2020Stephen Hart, Andrea Margheri, Federica Paci + 1 more
Computers & Security
Riskio is proposed, a tabletop game to increase cyber security awareness for people with no-technical background working in organisations that provides an active learning environment where players build knowledge on cyber security attacks and defences by playing both the attacker and the defender of critical assets in a fictitious organisation.
A Blockchain-Based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems
107 Citations 2020Shailendra Rathore, Jong Hyuk Park
IEEE Transactions on Industrial Informatics
DeepBlockIoTNet is proposed, a secure DL approach with blockchain for the IoT network wherein the DL operation is carried out among the edge nodes at the edge layer in a decentralized, secure manner and the blockchain provides a secureDL operation and removes the control from a centralized authority.
A tale of two cybers - how threat reporting by cybersecurity firms systematically underrepresents threats to civil society
107 Citations 2020Lennart Maschmeyer, Ronald J. Deibert, Jon R. Lindsay
Journal of Information Technology & Politics
The findings confirm the neglect of civil society threats in commercial reporting, supporting the hypothesis that commercial interests of firms will produce a systematic bias in reporting, which functions as much as advertising as intelligence.
Artificial intelligence for securing industrial-based cyber–physical systems
122 Citations 2020Zhihan Lv, Dongliang Chen, Ranran Lou + 1 more
Future Generation Computer Systems
This research on the combination of a CPS and artificial intelligence in the construction industry can provide a theoretical basis and practical reference materials for the development of the intelligent construction industry.
System log clustering approaches for cyber security applications: A survey
106 Citations 2020Max Landauer, Florian Skopik, Markus Wurzenberger + 1 more
Computers & Security
A survey of existing approaches to analyze log data reveals that approaches usually pursue one or more of four major objectives: overview and filtering, parsing and signature extraction, static outlier detection, and sequences and dynamic anomaly detection.
Secure State Estimation and Control of Cyber-Physical Systems: A Survey
534 Citations 2020Derui Ding, Qing‐Long Han, Xiaohua Ge + 1 more
IEEE Transactions on Systems Man and Cybernetics Systems
The latest development of secure state estimation is summarized in light of different performance indicators and defense strategies and two specific application examples of water supply distribution systems and wide-area power systems are presented to demonstrate the applicability of securestate estimation and control approaches.
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
107 Citations 2023Morteza Safaei Pour, Christelle Nader, Kurt Friday + 1 more
Computers & Security
As the Internet has transformed into a critical infrastructure, society has become more vulnerable to its security flaws. Despite substantial efforts to address many of these vulnerabilities by industry, government, and academia, cyber security attacks continue to increase in intensity, diversity, and impact. Thus, it becomes intuitive to investigate the current cyber security threats, assess the extent to which corresponding defenses have been deployed, and evaluate the effectiveness of risk mitigation efforts. Addressing these issues in a sound manner requires large-scale empirical data to b...