TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
Industrial Cyber-physical System (ICPS) is utilized for monitoring critical events such as structural equipment conditions in industrial environments. Such a system can easily be a point of attraction for the cyberattackers, in addition to system faults, severe resource constraints (e.g., bandwidth...
| Main Authors: | Rahman, Md. Arafatur, Hai, Tao, Md Zakirul, Alam Bhuiyan, Wang, Tian, Wu, Jie, Sinan Q., Salih, Li, Yafeng, Hayajneh, Thaier |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26311/ http://umpir.ump.edu.my/id/eprint/26311/1/TrustData%20-%20Trustworthy%20and%20Secured%20Data%20Collection%20for%20Event%20Detection%20in%20Industrial%20Cyber-Physical%20System.pdf |
Similar Items
DependData: data collection dependability through three-layer decision-making in BSNs for healthcare monitoring
by: Hai, Tao, et al.
Published: (2020)
by: Hai, Tao, et al.
Published: (2020)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Healthcare-Chain: Blockchain-Enabled Decentralized Trustworthy System in Healthcare Management Industry 4.0 with Cyber Safeguard
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
Protected bidding against compromised information injection in IoT-based smart grid
by: Bhuiyan, Md Zakirul Alam, et al.
Published: (2019)
by: Bhuiyan, Md Zakirul Alam, et al.
Published: (2019)
Trustworthiness in Social Big Data Incorporating Semantic Analysis, Machine Learning and Distributed Data Processing
by: Abu Salih, Bilal Ahmad Abdal Rahman
Published: (2018)
by: Abu Salih, Bilal Ahmad Abdal Rahman
Published: (2018)
Building trustworthy E-commerce website
by: Che Hussin, Ab. Razak
Published: (2007)
by: Che Hussin, Ab. Razak
Published: (2007)
RERS-CC: Robotic facial recognition system for improving the accuracy of human face identification using HRI
by: Wang, Jing, et al.
Published: (2021)
by: Wang, Jing, et al.
Published: (2021)
Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
Big Data Reduction for a Smart City’s Critical Infrastructural Health Monitoring
by: Wang, Tian, et al.
Published: (2018)
by: Wang, Tian, et al.
Published: (2018)
An Approach for Time-aware Domain-based Analysis of Users Trustworthiness in Big Social Data
by: Salih, B., et al.
Published: (2015)
by: Salih, B., et al.
Published: (2015)
The Art of Using Cross-Layer Design in Cognitive Radio Networks
by: Qusay, Medhat Salih, et al.
Published: (2017)
by: Qusay, Medhat Salih, et al.
Published: (2017)
Replacing missing values using trustworthy data values from web data sources
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
An enhanced version of black hole algorithm via levy flight for optimization and data lustering problems
by: Haneen, Abd Wahab, et al.
Published: (2019)
by: Haneen, Abd Wahab, et al.
Published: (2019)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
A 3D-collaborative wireless network: towards resilient communication for rescuing flood victims
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
A connection probability model for communications networks under regional failures
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
EduChain: CIA-compliant blockchain for intelligent cyber defense of microservices in education industry 4.0
by: Rahman, Md. Arafatur, et al.
Published: (2022)
by: Rahman, Md. Arafatur, et al.
Published: (2022)
Data discovery algorithm for scientific data grid environment
by: Abdullah, Azizol, et al.
Published: (2005)
by: Abdullah, Azizol, et al.
Published: (2005)
Smart Routing Management Framework Exploiting Dynamic Data Resources of Cross-Layer Design and Machine Learning Approaches for Mobile Cognitive Radio Networks: A Survey
by: Salih, Qusay Medhat, et al.
Published: (2020)
by: Salih, Qusay Medhat, et al.
Published: (2020)
Collab-SAR: A collaborative avalanche search-and-rescue missions exploiting hostile alpine networks
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
Development of a web-extension for authentication of online hadith texts
by: Kabir, M. Nomani, et al.
Published: (2018)
by: Kabir, M. Nomani, et al.
Published: (2018)
Interactive Learning Experience-Driven Smart Communications Networks for Cognitive Load Management in Grammar Learning Context
by: Refat, Nadia, et al.
Published: (2019)
by: Refat, Nadia, et al.
Published: (2019)
SDN Enabled Big Data Analytics and Framework for Sensor Data of Vehicle Health, Safety and Monitoring System
by: Ahmad, Tanvir, et al.
Published: (2023)
by: Ahmad, Tanvir, et al.
Published: (2023)
Tree-based classification to users’ trustworthiness in OSNs
by: Nabipourshiri, R., et al.
Published: (2018)
by: Nabipourshiri, R., et al.
Published: (2018)
A cyber kill chain approach for detecting advanced persistent threats
by: Ahmed, Yussuf, et al.
Published: (2021)
by: Ahmed, Yussuf, et al.
Published: (2021)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Cloud enabled e-glossary system: a smart campus perspective
by: Khan, Musaddiq Majid, et al.
Published: (2018)
by: Khan, Musaddiq Majid, et al.
Published: (2018)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Nomadic people optimizer (NPO) for large-scale optimization problems
by: Mohamd Salih, Sinan Qahtan
Published: (2019)
by: Mohamd Salih, Sinan Qahtan
Published: (2019)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Cyber physical systems for collaborative indoor localization and mapping
by: Ang, Jacqueline Lee Fang
Published: (2018)
by: Ang, Jacqueline Lee Fang
Published: (2018)
IoT for energy efficient green highway lighting systems: Challenges and issues
by: Mukta, Marufa Y., et al.
Published: (2020)
by: Mukta, Marufa Y., et al.
Published: (2020)
Similar Items
-
DependData: data collection dependability through three-layer decision-making in BSNs for healthcare monitoring
by: Hai, Tao, et al.
Published: (2020) -
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019) -
Healthcare-Chain: Blockchain-Enabled Decentralized Trustworthy System in Healthcare Management Industry 4.0 with Cyber Safeguard
by: Islam, Md. Shohidul, et al.
Published: (2023) -
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021) -
Protected bidding against compromised information injection in IoT-based smart grid
by: Bhuiyan, Md Zakirul Alam, et al.
Published: (2019)