iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
To meet the demand of the world's largest population, smart manufacturing has accelerated the adoption of smart factories—where autonomous and cooperative instruments across all levels of production and logistics networks are integrated through a Cyber-Physical Production System (CPPS). However...
| Main Authors: | Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier Ltd
2024
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/38967/ http://umpir.ump.edu.my/id/eprint/38967/1/iBUST_An%20intelligent%20behavioural%20trust%20model%20for%20securing%20industrial%20cyber-physical%20systems.pdf |
Similar Items
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
by: Azad, Saiful, et al.
Published: (2021)
by: Azad, Saiful, et al.
Published: (2021)
UDTN-RS : A new underwater delay tolerant network routing protocol for coastal patrol and surveillance
by: Azad, Saiful, et al.
Published: (2023)
by: Azad, Saiful, et al.
Published: (2023)
TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
TeKET: a tree-based unsupervised keyphrase extraction technique
by: Rabby, Gollam, et al.
Published: (2020)
by: Rabby, Gollam, et al.
Published: (2020)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
iWorksafe: Towards healthy workplaces during COVID-19 with an intelligent phealth app for industrial settings
by: Kaiser, M. Shamim, et al.
Published: (2021)
by: Kaiser, M. Shamim, et al.
Published: (2021)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
by: Mohd Fadli Kasim,
Published: (2021)
by: Mohd Fadli Kasim,
Published: (2021)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Time truncated generalized chain sampling plan for pareto distribution of the 2nd kind
by: Razzaque Mughal, Abdur, et al.
Published: (2015)
by: Razzaque Mughal, Abdur, et al.
Published: (2015)
The Application of Mixed Method in Developing a Cyber
Terrorism Framework
by: Ahmad, Rabiah, et al.
Published: (2012)
by: Ahmad, Rabiah, et al.
Published: (2012)
Evaluated reputation-based trust for WSN security
by: Said Alkalbani, Abdullah, et al.
Published: (2014)
by: Said Alkalbani, Abdullah, et al.
Published: (2014)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Cyber physical systems for collaborative indoor localization and mapping
by: Ang, Jacqueline Lee Fang
Published: (2018)
by: Ang, Jacqueline Lee Fang
Published: (2018)
Sistem kafe siber (Cyber cafe’ system) / Norhashimah Hashim
by: Norhashimah , Hashim
Published: (2003)
by: Norhashimah , Hashim
Published: (2003)
EduChain: CIA-compliant blockchain for intelligent cyber defense of microservices in education industry 4.0
by: Rahman, Md. Arafatur, et al.
Published: (2022)
by: Rahman, Md. Arafatur, et al.
Published: (2022)
C++ Programming tutoring simulation "CyberCPP" / Muhammad Nor Mahat
by: Muhammad Nor, Mahat
Published: (2005)
by: Muhammad Nor, Mahat
Published: (2005)
CyberAid: Are your children safe from cyberbullying?
by: Thun, Lee Jia *, et al.
Published: (2021)
by: Thun, Lee Jia *, et al.
Published: (2021)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
Cyber security capability maturity model based on Maqasid A Shari’ah (MS-C2M2)
by: Abdul Aziz, Normaziah, et al.
Published: (2020)
by: Abdul Aziz, Normaziah, et al.
Published: (2020)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
Fundamental of zero trust among digital employees in migration to industry 4.0: Cyber security and movement to iot in Malaysian perspectives
by: Irza Hanie, Abu Samah, et al.
Published: (2023)
by: Irza Hanie, Abu Samah, et al.
Published: (2023)
CIT572 – CYBER MARKETING NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CIT572 – Cyber Marketing June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Hyper-heuristic strategy for input-output-based interaction testing
by: Din, Fakhrud, et al.
Published: (2022)
by: Din, Fakhrud, et al.
Published: (2022)
Linking consumer trust perception in constructing an e-commerce trust model
by: Che Hussin, Ab. Razak, et al.
Published: (2008)
by: Che Hussin, Ab. Razak, et al.
Published: (2008)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
A medical cyber-physical system utilizing the bayes algorithm for post-diagnosis patient supervision
by: Mizanur, Rahman, et al.
Published: (2024)
by: Mizanur, Rahman, et al.
Published: (2024)
Modeling E-Government adoption: trust, perceived risk and
political efficacy
by: Hussein, Ramlah, et al.
Published: (2010)
by: Hussein, Ramlah, et al.
Published: (2010)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Similar Items
-
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
by: Azad, Saiful, et al.
Published: (2021) -
UDTN-RS : A new underwater delay tolerant network routing protocol for coastal patrol and surveillance
by: Azad, Saiful, et al.
Published: (2023) -
TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
by: Rahman, Md. Arafatur, et al.
Published: (2020) -
TeKET: a tree-based unsupervised keyphrase extraction technique
by: Rabby, Gollam, et al.
Published: (2020) -
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)