Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: International Journal of Information Security 1/2022

19.03.2021 | Regular Contribution

Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations

verfasst von: Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab

Erschienen in: International Journal of Information Security | Ausgabe 1/2022

Einloggen, um Zugang zu erhalten
share
TEILEN

Abstract

The recent digital revolution led robots to become integrated more than ever into different domains such as agricultural, medical, industrial, military, police (law enforcement), and logistics. Robots are devoted to serve, facilitate, and enhance the human life. However, many incidents have been occurring, leading to serious injuries and devastating impacts such as the unnecessary loss of human lives. Unintended accidents will always take place, but the ones caused by malicious attacks represent a very challenging issue. This includes maliciously hijacking and controlling robots and causing serious economic and financial losses. This paper reviews the main security vulnerabilities, threats, risks, and their impacts, and the main security attacks within the robotics domain. In this context, different approaches and recommendations are presented in order to enhance and improve the security level of robotic systems such as multi-factor device/user authentication schemes, in addition to multi-factor cryptographic algorithms. We also review the recently presented security solutions for robotic systems.
Literatur
1.
Zurück zum Zitat Rüßmann, M., Lorenz, M., Gerbert, P., Waldner, M., Justus, J., Engel, P., Harnisch, M.: Industry 4.0: the future of productivity and growth in manufacturing industries. Boston Consult. Group 9(1), 54–89 (2015) Rüßmann, M., Lorenz, M., Gerbert, P., Waldner, M., Justus, J., Engel, P., Harnisch, M.: Industry 4.0: the future of productivity and growth in manufacturing industries. Boston Consult. Group 9(1), 54–89 (2015)
2.
Zurück zum Zitat Bahrin, M.A.K., Othman, M.F., Nor Azli, N.H., Talib, M.F.: Industry 4.0: a review on industrial automation and robotic. J. Teknol. 78(6–13), 137–143 (2016) Bahrin, M.A.K., Othman, M.F., Nor Azli, N.H., Talib, M.F.: Industry 4.0: a review on industrial automation and robotic. J. Teknol. 78(6–13), 137–143 (2016)
3.
Zurück zum Zitat Pfeiffer, S.: Robots, industry 4.0 and humans, or why assembly work is more than routine work. Societies 6(2), 16 (2016) Pfeiffer, S.: Robots, industry 4.0 and humans, or why assembly work is more than routine work. Societies 6(2), 16 (2016)
4.
Zurück zum Zitat Shyvakov, O.: Developing a security framework for robots. Master’s thesis, University of Twente (2017) Shyvakov, O.: Developing a security framework for robots. Master’s thesis, University of Twente (2017)
5.
Zurück zum Zitat Simoens, P., Dragone, M., Saffiotti, A.: The internet of robotic things: a review of concept, added value and applications. Int. J. Adv. Robot. Syst. 15(1), 1729881418759424 (2018) Simoens, P., Dragone, M., Saffiotti, A.: The internet of robotic things: a review of concept, added value and applications. Int. J. Adv. Robot. Syst. 15(1), 1729881418759424 (2018)
6.
Zurück zum Zitat Chui, M., Manyika, J., Miremadi, M.: Where machines could replace humans-and where they can’t (yet). McKinsey Q. 7, 1–6 (2016) Chui, M., Manyika, J., Miremadi, M.: Where machines could replace humans-and where they can’t (yet). McKinsey Q. 7, 1–6 (2016)
7.
Zurück zum Zitat Kirschgens, L.A., Ugarte, I.Z., Uriarte, E.G., Rosas, A.M., Vilches, V.M.: Robot hazards: from safety to security (2018). arXiv preprint arXiv:​1806.​06681 Kirschgens, L.A., Ugarte, I.Z., Uriarte, E.G., Rosas, A.M., Vilches, V.M.: Robot hazards: from safety to security (2018). arXiv preprint arXiv:​1806.​06681
8.
Zurück zum Zitat Guerrero-Higueras, Á.M., DeCastro-Garcia, N., Matellan, V.: Detection of cyber-attacks to indoor real time localization systems for autonomous robots. Robot. Auton. Syst. 99, 75–83 (2018) Guerrero-Higueras, Á.M., DeCastro-Garcia, N., Matellan, V.: Detection of cyber-attacks to indoor real time localization systems for autonomous robots. Robot. Auton. Syst. 99, 75–83 (2018)
9.
Zurück zum Zitat Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015) Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015)
10.
Zurück zum Zitat Cerrudo, C., Apa, L.: Hacking robots before skynet. Cybersecurity Insight, IOActive Report, Seattle, USA (2017) Cerrudo, C., Apa, L.: Hacking robots before skynet. Cybersecurity Insight, IOActive Report, Seattle, USA (2017)
11.
Zurück zum Zitat Vuong, T., Filippoupolitis, A., Loukas, G., Gan, D.: Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 338–343. IEEE (2014) Vuong, T., Filippoupolitis, A., Loukas, G., Gan, D.: Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 338–343. IEEE (2014)
12.
Zurück zum Zitat Dash, P., Karimibiuki, M., Pattabiraman, K.: Stealthy attacks against robotic vehicles protected by control-based intrusion detection techniques. J. Digit. Threats Res. Pract. 2(1), 1–25 (2021) Dash, P., Karimibiuki, M., Pattabiraman, K.: Stealthy attacks against robotic vehicles protected by control-based intrusion detection techniques. J. Digit. Threats Res. Pract. 2(1), 1–25 (2021)
13.
Zurück zum Zitat Chowdhury, A., Karmakar, G., Kamruzzaman, J.: Survey of recent cyber security attacks on robotic systems and their mitigation approaches. In: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, pp. 1426–1441. IGI Global (2019) Chowdhury, A., Karmakar, G., Kamruzzaman, J.: Survey of recent cyber security attacks on robotic systems and their mitigation approaches. In: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, pp. 1426–1441. IGI Global (2019)
14.
Zurück zum Zitat Lacava, G., Marotta, A., Martinelli, F., Saracino, A., La Marra, A., Gil-Uriarte, E., Vilches, V.M.: Current research issues on cyber security in robotics (2020) Lacava, G., Marotta, A., Martinelli, F., Saracino, A., La Marra, A., Gil-Uriarte, E., Vilches, V.M.: Current research issues on cyber security in robotics (2020)
15.
Zurück zum Zitat Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014) Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)
16.
Zurück zum Zitat Kehoe, B., Patil, S., Abbeel, P., Goldberg, K.: A survey of research on cloud robotics and automation. IEEE Trans. Autom. Sci. Eng. 12(2), 398–409 (2015) Kehoe, B., Patil, S., Abbeel, P., Goldberg, K.: A survey of research on cloud robotics and automation. IEEE Trans. Autom. Sci. Eng. 12(2), 398–409 (2015)
17.
Zurück zum Zitat Chowdhury, A., Karmakar, G., Kamruzzaman, J.: Survey of recent cyber security attacks on robotic systems and their mitigation approaches. In: Detecting and Mitigating Robotic Cyber Security Risks, pp. 284–299. IGI Global (2017) Chowdhury, A., Karmakar, G., Kamruzzaman, J.: Survey of recent cyber security attacks on robotic systems and their mitigation approaches. In: Detecting and Mitigating Robotic Cyber Security Risks, pp. 284–299. IGI Global (2017)
18.
Zurück zum Zitat Jeong, S.-Y., Choi, I.-J., Kim, Y.-J., Shin, Y.-M., Han, J.-H., Jung, G.-H., Kim, K.-G.: A study on ros vulnerabilities and countermeasure. In: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human–Robot Interaction, pp. 147–148. ACM (2017) Jeong, S.-Y., Choi, I.-J., Kim, Y.-J., Shin, Y.-M., Han, J.-H., Jung, G.-H., Kim, K.-G.: A study on ros vulnerabilities and countermeasure. In: Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human–Robot Interaction, pp. 147–148. ACM (2017)
19.
Zurück zum Zitat Hellaoui, H., Koudil, M., Bouabdallah, A.: Energy-efficient mechanisms in security of the internet of things: a survey. Comput. Netw. 127, 173–189 (2017) Hellaoui, H., Koudil, M., Bouabdallah, A.: Energy-efficient mechanisms in security of the internet of things: a survey. Comput. Netw. 127, 173–189 (2017)
20.
Zurück zum Zitat Guiochet, J., Machin, M., Waeselynck, H.: Safety-critical advanced robots: a survey. Robot. Auton. Syst. 94, 43–52 (2017) Guiochet, J., Machin, M., Waeselynck, H.: Safety-critical advanced robots: a survey. Robot. Auton. Syst. 94, 43–52 (2017)
21.
Zurück zum Zitat Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., Schartner, P.: Security for the robot operating system. Robot. Auton. Syst. 98, 192–203 (2017) Dieber, B., Breiling, B., Taurer, S., Kacianka, S., Rass, S., Schartner, P.: Security for the robot operating system. Robot. Auton. Syst. 98, 192–203 (2017)
22.
Zurück zum Zitat Alcaraz, C., Cazorla, L., Lopez, J.: Cyber-physical systems for wide-area situational awareness. In: Cyber-Physical Systems, pp. 305–317. Elsevier (2017) Alcaraz, C., Cazorla, L., Lopez, J.: Cyber-physical systems for wide-area situational awareness. In: Cyber-Physical Systems, pp. 305–317. Elsevier (2017)
23.
Zurück zum Zitat Rubio, J.E., Alcaraz, C., Roman, R., Lopez, J.: Current cyber-defense trends in industrial control systems. Comput. Secur. 87, 101561 (2019) Rubio, J.E., Alcaraz, C., Roman, R., Lopez, J.: Current cyber-defense trends in industrial control systems. Comput. Secur. 87, 101561 (2019)
24.
Zurück zum Zitat Jahan, F., Sun, W., Niyaz, Q., Alam, M.: Security modeling of autonomous systems: a survey. ACM Comput. Surv. (CSUR) 52(5), 1–34 (2019) Jahan, F., Sun, W., Niyaz, Q., Alam, M.: Security modeling of autonomous systems: a survey. ACM Comput. Surv. (CSUR) 52(5), 1–34 (2019)
25.
Zurück zum Zitat Chen, J., Li, K., Zhang, Z., Li, K., Yu, P.S.: A survey on applications of artificial intelligence in fighting against covid-19 (2020). arXiv preprint arXiv:​2007.​02202 Chen, J., Li, K., Zhang, Z., Li, K., Yu, P.S.: A survey on applications of artificial intelligence in fighting against covid-19 (2020). arXiv preprint arXiv:​2007.​02202
26.
Zurück zum Zitat Brem, A., Viardot, E., Nylund, P.A.: Implications of the coronavirus (covid-19) outbreak for innovation: which technologies will improve our lives? Technol. Forecast. Soc. Change 163, (2020) Brem, A., Viardot, E., Nylund, P.A.: Implications of the coronavirus (covid-19) outbreak for innovation: which technologies will improve our lives? Technol. Forecast. Soc. Change 163, (2020)
27.
Zurück zum Zitat Khan, F.N., Khanam, A.A., Ramlal, A., Ahmad, S.: A review on predictive systems and data models for covid-19. In: Computational Intelligence Methods in COVID-19: Surveillance, Prevention, Prediction and Diagnosis, pp. 123–164. Springer (2020) Khan, F.N., Khanam, A.A., Ramlal, A., Ahmad, S.: A review on predictive systems and data models for covid-19. In: Computational Intelligence Methods in COVID-19: Surveillance, Prevention, Prediction and Diagnosis, pp. 123–164. Springer (2020)
28.
Zurück zum Zitat Fan, D., Li, Y., Liu, W., Yue, X.-G., Boustras, G.: Weaving public health and safety nets to respond the covid-19 pandemic. Saf. Sci. 134, 105058 (2020) Fan, D., Li, Y., Liu, W., Yue, X.-G., Boustras, G.: Weaving public health and safety nets to respond the covid-19 pandemic. Saf. Sci. 134, 105058 (2020)
29.
Zurück zum Zitat Bokolo Anthony Jnr: Use of telemedicine and virtual care for remote treatment in response to covid-19 pandemic. J. Med. Syst. 44(7), 1–9 (2020) Bokolo Anthony Jnr: Use of telemedicine and virtual care for remote treatment in response to covid-19 pandemic. J. Med. Syst. 44(7), 1–9 (2020)
30.
Zurück zum Zitat Yaacoub, J.-P.A., Noura, H.N., Salman, O., Chehab, A.: Security analysis of drones systems: attacks, limitations, and recommendations. Internet Things 11, 100218 (2020) Yaacoub, J.-P.A., Noura, H.N., Salman, O., Chehab, A.: Security analysis of drones systems: attacks, limitations, and recommendations. Internet Things 11, 100218 (2020)
31.
Zurück zum Zitat Wang, H., Cheng, H., Hao, H.: The use of unmanned aerial vehicle in military operations. In: International Conference on Man–Machine–Environment System Engineering, pp. 939–945. Springer (2020) Wang, H., Cheng, H., Hao, H.: The use of unmanned aerial vehicle in military operations. In: International Conference on Man–Machine–Environment System Engineering, pp. 939–945. Springer (2020)
32.
Zurück zum Zitat Kamel, M.A., Yu, X., Zhang, Y.: Formation control and coordination of multiple unmanned ground vehicles in normal and faulty situations: a review. Annu. Rev. Control 49, 128–144 (2020) MathSciNet Kamel, M.A., Yu, X., Zhang, Y.: Formation control and coordination of multiple unmanned ground vehicles in normal and faulty situations: a review. Annu. Rev. Control 49, 128–144 (2020) MathSciNet
33.
Zurück zum Zitat Nandyal, A.A., Adithya, D.M., Karthik, K., Manikantan, G., Sudha, P.N.: A literature survey on “unmanned underwater vehicle for monitoring aquatic ecosystem”. Int. J. Eng. Appl. Sci. Technol. 5(2), 599–601 (2020). ( ISSN: 2455-2143) Nandyal, A.A., Adithya, D.M., Karthik, K., Manikantan, G., Sudha, P.N.: A literature survey on “unmanned underwater vehicle for monitoring aquatic ecosystem”. Int. J. Eng. Appl. Sci. Technol. 5(2), 599–601 (2020). ( ISSN: 2455-2143)
34.
Zurück zum Zitat He, Y., Wang, D.B., Ali, Z.A.: A review of different designs and control models of remotely operated underwater vehicle. Meas. Control, p. 0020294020952483 (2020) He, Y., Wang, D.B., Ali, Z.A.: A review of different designs and control models of remotely operated underwater vehicle. Meas. Control, p. 0020294020952483 (2020)
35.
Zurück zum Zitat Yaacoub, J.-P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77, 102019 (2020) Yaacoub, J.-P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77, 102019 (2020)
36.
Zurück zum Zitat Yaacoub, J.P.A., Fernandez, J.H., Noura, H.N., Chehab, A.: Security of power line communication systems: issues, limitations and existing solutions. Comput. Sci. Rev. 39, 100331 (2021) MathSciNet Yaacoub, J.P.A., Fernandez, J.H., Noura, H.N., Chehab, A.: Security of power line communication systems: issues, limitations and existing solutions. Comput. Sci. Rev. 39, 100331 (2021) MathSciNet
37.
Zurück zum Zitat Yaacoub, J.-P.A., Noura, M., Noura, H.N., Salman, O., Yaacoub, E., Couturier, R., Chehab, A.: Securing internet of medical things systems: limitations, issues and recommendations. Future Gener. Comput. Syst. 105, 581–606 (2020) Yaacoub, J.-P.A., Noura, M., Noura, H.N., Salman, O., Yaacoub, E., Couturier, R., Chehab, A.: Securing internet of medical things systems: limitations, issues and recommendations. Future Gener. Comput. Syst. 105, 581–606 (2020)
38.
Zurück zum Zitat Gogu, G., Ray, P., Neagoe, M., Gogu, G., Diaconescu, D., Pocola, A.G., Pop, D.O., Petra, C.: Robotics and manufacturing. In: Talaba, D., Roche, T. (eds.) Product Engineering: Eco-Design, Technologies and Green Energy, p. 348. Springer, Cham (2006) Gogu, G., Ray, P., Neagoe, M., Gogu, G., Diaconescu, D., Pocola, A.G., Pop, D.O., Petra, C.: Robotics and manufacturing. In: Talaba, D., Roche, T. (eds.) Product Engineering: Eco-Design, Technologies and Green Energy, p. 348. Springer, Cham (2006)
39.
Zurück zum Zitat Kadir, M.A.: Role of telemedicine in healthcare during covid-19 pandemic in developing countries. Telehealth Med, Today (2020) Kadir, M.A.: Role of telemedicine in healthcare during covid-19 pandemic in developing countries. Telehealth Med, Today (2020)
40.
Zurück zum Zitat Beasley, R.A.: Medical robots: current systems and research directions. J. Robot. (2012) Beasley, R.A.: Medical robots: current systems and research directions. J. Robot. (2012)
41.
Zurück zum Zitat Rosen, J., Hannaford, B.: Doc at a distance. IEEE Spectr. 43(10), 34–39 (2006) Rosen, J., Hannaford, B.: Doc at a distance. IEEE Spectr. 43(10), 34–39 (2006)
42.
Zurück zum Zitat Cheein, F.A.A., Carelli, R.: Agricultural robotics: unmanned robotic service units in agricultural tasks. IEEE Ind. Electron. Mag. 7(3), 48–58 (2013) Cheein, F.A.A., Carelli, R.: Agricultural robotics: unmanned robotic service units in agricultural tasks. IEEE Ind. Electron. Mag. 7(3), 48–58 (2013)
43.
Zurück zum Zitat Murphy, R.R., Tadokoro, S., Nardi, D., Jacoff, A., Fiorini, P., Choset, H., Erkmen, A.M.: Search and rescue robotics. In: Siciliano, B., Khatib, O. (eds.) Springer Handbook of Robotics, pp. 1151–1173. Springer, Berlin (2008) Murphy, R.R., Tadokoro, S., Nardi, D., Jacoff, A., Fiorini, P., Choset, H., Erkmen, A.M.: Search and rescue robotics. In: Siciliano, B., Khatib, O. (eds.) Springer Handbook of Robotics, pp. 1151–1173. Springer, Berlin (2008)
44.
Zurück zum Zitat Murphy, R.R., Tadokoro, S., Kleiner, A.: Disaster robotics. In: Siciliano, B., Khatib, O. (eds.) Springer Handbook of Robotics, pp. 1577–1604. Springer, Berlin (2016) Murphy, R.R., Tadokoro, S., Kleiner, A.: Disaster robotics. In: Siciliano, B., Khatib, O. (eds.) Springer Handbook of Robotics, pp. 1577–1604. Springer, Berlin (2016)
45.
Zurück zum Zitat Stager, P.: Visual search capability in search and rescue(sar) (1974) Stager, P.: Visual search capability in search and rescue(sar) (1974)
46.
Zurück zum Zitat McKirdy, E.: Thailand cave rescue: boys appear in new video, ‘i am healthy’ (2018) McKirdy, E.: Thailand cave rescue: boys appear in new video, ‘i am healthy’ (2018)
47.
Zurück zum Zitat Naghsh, A.M., Gancet, J., Tanoto, A., Roast, C.: Analysis and design of human–robot swarm interaction in firefighting. In: The 17th IEEE International Symposium on Robot and Human Interactive Communication, 2008. RO-MAN 2008, pp. 255–260. IEEE (2008) Naghsh, A.M., Gancet, J., Tanoto, A., Roast, C.: Analysis and design of human–robot swarm interaction in firefighting. In: The 17th IEEE International Symposium on Robot and Human Interactive Communication, 2008. RO-MAN 2008, pp. 255–260. IEEE (2008)
48.
Zurück zum Zitat Hong, J.H., Matson, E.T., Taylor, J.M.: Design of knowledge-based communication between human and robot using ontological semantic technology in firefighting domain. In: Robot Intelligence Technology and Applications, vol. 2, pp. 311–325. Springer (2014) Hong, J.H., Matson, E.T., Taylor, J.M.: Design of knowledge-based communication between human and robot using ontological semantic technology in firefighting domain. In: Robot Intelligence Technology and Applications, vol. 2, pp. 311–325. Springer (2014)
49.
Zurück zum Zitat Mansour, H., Bitar, E., Fares, Y., Makdessi, A., Maalouf, A., El Ghoul, M., Mansour, M., Chami, A., Khalil, M., Jalkh, A., et al.: Beirut port ammonium nitrate explosion. SSRN (2020) Mansour, H., Bitar, E., Fares, Y., Makdessi, A., Maalouf, A., El Ghoul, M., Mansour, M., Chami, A., Khalil, M., Jalkh, A., et al.: Beirut port ammonium nitrate explosion. SSRN (2020)
50.
Zurück zum Zitat Cheaito, M.A., Al-Hajj, S.: A brief report on the beirut port explosion. Mediterr. J. Emerg. Med, Acute Care (2020) Cheaito, M.A., Al-Hajj, S.: A brief report on the beirut port explosion. Mediterr. J. Emerg. Med, Acute Care (2020)
51.
Zurück zum Zitat Oxford Analytica. Beirut blast could bring hunger, disease and fury. Emerald Expert Briefings (2020) Oxford Analytica. Beirut blast could bring hunger, disease and fury. Emerald Expert Briefings (2020)
52.
Zurück zum Zitat Stennett, C., Gaulter, S., Akhavan, J.: An estimate of the TNT-equivalent net explosive quantity (NEQ) of the Beirut port explosion using publicly-available tools and data. Propellants Explos, Pyrotech. 45(11), 1675–1679 (2020) Stennett, C., Gaulter, S., Akhavan, J.: An estimate of the TNT-equivalent net explosive quantity (NEQ) of the Beirut port explosion using publicly-available tools and data. Propellants Explos, Pyrotech. 45(11), 1675–1679 (2020)
53.
Zurück zum Zitat Thielman, S.: Use of police robot to kill Dallas shooting suspect believed to be first in US history. The Guardian (2016) Thielman, S.: Use of police robot to kill Dallas shooting suspect believed to be first in US history. The Guardian (2016)
54.
Zurück zum Zitat Ringrose, K., Ramjee, D.: Watch where you walk: law enforcement surveillance and protester privacy. Calif. L. Rev. Online 11, 349 (2020) Ringrose, K., Ramjee, D.: Watch where you walk: law enforcement surveillance and protester privacy. Calif. L. Rev. Online 11, 349 (2020)
55.
Zurück zum Zitat Schulte, P.: Future war: Ai, drones, terrorism and counterterror. In: Handbook of Terrorism and Counter Terrorism Post 9/11. Edward Elgar Publishing (2019) Schulte, P.: Future war: Ai, drones, terrorism and counterterror. In: Handbook of Terrorism and Counter Terrorism Post 9/11. Edward Elgar Publishing (2019)
56.
Zurück zum Zitat Zych, J.: The use of weaponized kites and balloons in the Israeli-Palestinian conflict. Secur. Def. Q. 27(5), 71–83 (2019) Zych, J.: The use of weaponized kites and balloons in the Israeli-Palestinian conflict. Secur. Def. Q. 27(5), 71–83 (2019)
57.
Zurück zum Zitat Engberts, B., Gillissen, E.: Policing from above: drone use by the police. In: The Future of Drone Use, pp. 93–113. Springer (2016) Engberts, B., Gillissen, E.: Policing from above: drone use by the police. In: The Future of Drone Use, pp. 93–113. Springer (2016)
58.
Zurück zum Zitat Shachtman, N.: Military stats reveal epicenter of us drone war. Wired. com 9 (2012) Shachtman, N.: Military stats reveal epicenter of us drone war. Wired. com 9 (2012)
59.
Zurück zum Zitat Wilson, C.: Improvised explosive devices in Iraq: effects and countermeasures. In: CRS Report for Congress, Library of Congress Washington DC Congressional Research Service (2005) Wilson, C.: Improvised explosive devices in Iraq: effects and countermeasures. In: CRS Report for Congress, Library of Congress Washington DC Congressional Research Service (2005)
60.
Zurück zum Zitat Lesley-Dixon, K.: Northern Ireland: the troubles: from the provos to the det, 1968–1998. Pen and Sword (2018) Lesley-Dixon, K.: Northern Ireland: the troubles: from the provos to the det, 1968–1998. Pen and Sword (2018)
61.
Zurück zum Zitat Miller, D.: Rethinking Northern Ireland: Culture. Ideology and Colonialism. Routledge, London (2014) Miller, D.: Rethinking Northern Ireland: Culture. Ideology and Colonialism. Routledge, London (2014)
62.
Zurück zum Zitat Krishnan, A.: Killer Robots: Legality and Ethicality of Autonomous Weapons. Routledge, London (2016) Krishnan, A.: Killer Robots: Legality and Ethicality of Autonomous Weapons. Routledge, London (2016)
63.
Zurück zum Zitat Barboza, A.R.: The Irish Republican Army: an examination of imperialism, terror, and just war theory. Master’s thesis, California Polytechnic State University, San Luis Obispo (2020) Barboza, A.R.: The Irish Republican Army: an examination of imperialism, terror, and just war theory. Master’s thesis, California Polytechnic State University, San Luis Obispo (2020)
64.
Zurück zum Zitat Karnozov, V., et al.: Russia and Turkey put their latest equipment to the test in Syria. Def. Rev. Asia 14(2), 20 (2020) Karnozov, V., et al.: Russia and Turkey put their latest equipment to the test in Syria. Def. Rev. Asia 14(2), 20 (2020)
65.
Zurück zum Zitat Zoltán, Ő.: Special features of the Russian-Ukrainian armed conflict. Hadmérnök 15(1), 207–220 (2020) Zoltán, Ő.: Special features of the Russian-Ukrainian armed conflict. Hadmérnök 15(1), 207–220 (2020)
66.
Zurück zum Zitat Okpaleke, F., Burton, J.: 9 US grand strategy and the use of unmanned aerial vehicles during the George W. Bush administration. In: Emerging Technologies and International Security: Machines, the State, and War, p. 153 (2020) Okpaleke, F., Burton, J.: 9 US grand strategy and the use of unmanned aerial vehicles during the George W. Bush administration. In: Emerging Technologies and International Security: Machines, the State, and War, p. 153 (2020)
67.
Zurück zum Zitat Scipanov, L.V., Dolceanu, D.: The opportunity for using remotely operated underwater vehicles in support of naval actions. Bull. Carol I Natl. Def. Univ. 9(3), 62–68 (2020) Scipanov, L.V., Dolceanu, D.: The opportunity for using remotely operated underwater vehicles in support of naval actions. Bull. Carol I Natl. Def. Univ. 9(3), 62–68 (2020)
68.
Zurück zum Zitat Siwek, M., Wacławik, K.: Legal aspects of production and operation of autonomous combat robots. Problemy Mechatroniki: uzbrojenie, lotnictwo, inżynieria bezpieczeństwa, 11 (2020) Siwek, M., Wacławik, K.: Legal aspects of production and operation of autonomous combat robots. Problemy Mechatroniki: uzbrojenie, lotnictwo, inżynieria bezpieczeństwa, 11 (2020)
69.
Zurück zum Zitat Thornton, R., Miron, M.: Towards the ‘third revolution in military affairs’ the Russian military’s use of AI-enabled cyber warfare. RUSI J. 165, 1–10 (2020) Thornton, R., Miron, M.: Towards the ‘third revolution in military affairs’ the Russian military’s use of AI-enabled cyber warfare. RUSI J. 165, 1–10 (2020)
70.
Zurück zum Zitat Abiodun, T.F., Taofeek, C.R.: Unending war on boko haram terror in northeast Nigeria and the need for deployment of military robots or autonomous weapons systems to complement military operations. Journal DOI 6(6) (2020) Abiodun, T.F., Taofeek, C.R.: Unending war on boko haram terror in northeast Nigeria and the need for deployment of military robots or autonomous weapons systems to complement military operations. Journal DOI 6(6) (2020)
71.
Zurück zum Zitat Westerheijden, V.R.: Remote warfare comes home: an inquiry in the Dutch government’s development of discourse on airstrikes and drones between 1998–2020. Master’s thesis, Utrecht University (2020) Westerheijden, V.R.: Remote warfare comes home: an inquiry in the Dutch government’s development of discourse on airstrikes and drones between 1998–2020. Master’s thesis, Utrecht University (2020)
72.
Zurück zum Zitat Oxford Analytica: Uae’s bolstering of Libya’s haftar is a risky policy. Emerald Expert Briefings (oxan-db) (2020) Oxford Analytica: Uae’s bolstering of Libya’s haftar is a risky policy. Emerald Expert Briefings (oxan-db) (2020)
73.
Zurück zum Zitat Milan, F.F., Tabrizi, A.B.: Armed, unmanned, and in high demand: the drivers behind combat drones proliferation in the Middle East. Small Wars Insurgencies 31(4), 730–750 (2020) Milan, F.F., Tabrizi, A.B.: Armed, unmanned, and in high demand: the drivers behind combat drones proliferation in the Middle East. Small Wars Insurgencies 31(4), 730–750 (2020)
74.
Zurück zum Zitat Gallagher, K.: Killer optics: exports of Wescam sensors to Turkey (2020) Gallagher, K.: Killer optics: exports of Wescam sensors to Turkey (2020)
75.
Zurück zum Zitat Clark, M., Yazici, E.: Erdogan seeks to upend kremlin-backed status quo in Nagorno-Karabakh. Institute for the Study of War, p. 1 (2020) Clark, M., Yazici, E.: Erdogan seeks to upend kremlin-backed status quo in Nagorno-Karabakh. Institute for the Study of War, p. 1 (2020)
76.
Zurück zum Zitat Tol, T., et al.: Transitions online\_around the bloc-Tuesday, 27 October 2020. Transitions Online (11/02):9–11 (2020) Tol, T., et al.: Transitions online\_around the bloc-Tuesday, 27 October 2020. Transitions Online (11/02):9–11 (2020)
77.
Zurück zum Zitat Khan, N., Fahad, S., Naushad, M., Faisal, S.: Analysis of Arminia and Azerbijan war and its impact on both countries economies. Available at SSRN 3709329 (2020) Khan, N., Fahad, S., Naushad, M., Faisal, S.: Analysis of Arminia and Azerbijan war and its impact on both countries economies. Available at SSRN 3709329 (2020)
78.
Zurück zum Zitat Jenzen-Jones, N.R.: Understanding the threat posed by cots small UAVs armed with CBR payloads. In: 21st Century Prometheus, pp. 179–204. Springer (2020) Jenzen-Jones, N.R.: Understanding the threat posed by cots small UAVs armed with CBR payloads. In: 21st Century Prometheus, pp. 179–204. Springer (2020)
79.
Zurück zum Zitat Kaya, E.K.: Walking a fragile path: assessing the idlib de-militarization deal (2018) Kaya, E.K.: Walking a fragile path: assessing the idlib de-militarization deal (2018)
80.
Zurück zum Zitat Sadat, S.A.: Iran ties to the Palestinian Islamic resistance movement with emphasis on the Islamic Jihad Movement (PIJ), pp. 77–105 (2016) Sadat, S.A.: Iran ties to the Palestinian Islamic resistance movement with emphasis on the Islamic Jihad Movement (PIJ), pp. 77–105 (2016)
81.
Zurück zum Zitat Bendett, S.: Battle robots rivalry and the future of war (2019) Bendett, S.: Battle robots rivalry and the future of war (2019)
82.
Zurück zum Zitat Brookes, P.: The growing Iranian unmanned combat aerial vehicle threat needs us action. Herit. Found. Backgr. 3437 (2019) Brookes, P.: The growing Iranian unmanned combat aerial vehicle threat needs us action. Herit. Found. Backgr. 3437 (2019)
83.
Zurück zum Zitat Sims, A.: The rising drone threat from terrorists. Georget. J. Int. Aff. 19, 97–107 (2018) Sims, A.: The rising drone threat from terrorists. Georget. J. Int. Aff. 19, 97–107 (2018)
84.
Zurück zum Zitat Rossiter, A.: Bots on the ground: an impending UGV revolution in military affairs? Small Wars Insurgencies 31(4), 851–873 (2020) Rossiter, A.: Bots on the ground: an impending UGV revolution in military affairs? Small Wars Insurgencies 31(4), 851–873 (2020)
85.
Zurück zum Zitat Chávez, K., Swed, O.: Off the shelf: the violent nonstate actor drone threat. Air Space Power J. 29, 29 (2020) Chávez, K., Swed, O.: Off the shelf: the violent nonstate actor drone threat. Air Space Power J. 29, 29 (2020)
86.
Zurück zum Zitat Vogiatzis, D.: The way to the promised land or the door to Armageddon: how severe are the threats against the physical security of israeli offshore gas platforms? Naval Postgraduate School, Monterey, CA. Ph.D. thesis (2020) Vogiatzis, D.: The way to the promised land or the door to Armageddon: how severe are the threats against the physical security of israeli offshore gas platforms? Naval Postgraduate School, Monterey, CA. Ph.D. thesis (2020)
87.
Zurück zum Zitat Borg, S.: Assembling Israeli drone warfare: loitering surveillance and operational sustainability. Security Dialogue, p. 0967010620956796 (2020) Borg, S.: Assembling Israeli drone warfare: loitering surveillance and operational sustainability. Security Dialogue, p. 0967010620956796 (2020)
88.
Zurück zum Zitat Benjamin, G.: Drone culture: perspectives on autonomy and anonymity. AI & SOCIETY, pp. 1–11 (2020) Benjamin, G.: Drone culture: perspectives on autonomy and anonymity. AI & SOCIETY, pp. 1–11 (2020)
89.
Zurück zum Zitat Popister, F., Steopan, M., Pusca, A.: Surveillance robot for military use. Acta Tech. Napocensis-Ser. Appl. Math. Mech. Eng. 63(3) (2020) Popister, F., Steopan, M., Pusca, A.: Surveillance robot for military use. Acta Tech. Napocensis-Ser. Appl. Math. Mech. Eng. 63(3) (2020)
90.
Zurück zum Zitat Fishman, J., Kuperwasser, Y.: Willful blindness and the mistake of underestimation: the Oslo gamble. Natl. Resili. Polit. Soc. 2(1), 9–50 (2020) Fishman, J., Kuperwasser, Y.: Willful blindness and the mistake of underestimation: the Oslo gamble. Natl. Resili. Polit. Soc. 2(1), 9–50 (2020)
91.
Zurück zum Zitat Marcus, R.D.: Learning ‘under fire’: Israel’s improvised military adaptation to Hamas tunnel warfare. J. Strateg. Stud. 42(3–4), 344–370 (2019) Marcus, R.D.: Learning ‘under fire’: Israel’s improvised military adaptation to Hamas tunnel warfare. J. Strateg. Stud. 42(3–4), 344–370 (2019)
92.
Zurück zum Zitat Michael, K., Dostri, O.: The Hamas military buildup. The crisis of the Gaza strip: a way out (Tel Aviv: INSS, 2017), pp. 49–60 (2019) Michael, K., Dostri, O.: The Hamas military buildup. The crisis of the Gaza strip: a way out (Tel Aviv: INSS, 2017), pp. 49–60 (2019)
93.
Zurück zum Zitat White, J.: The combat performance of Hamas in the Gaza war of 2014. CTC Sentin 7(9), 9–13 (2014) White, J.: The combat performance of Hamas in the Gaza war of 2014. CTC Sentin 7(9), 9–13 (2014)
94.
Zurück zum Zitat Gillespie, P.G.: Weapons of choice: the development of precision guided munitions. The University of Alabama Press, Tuscaloosa (2006) Gillespie, P.G.: Weapons of choice: the development of precision guided munitions. The University of Alabama Press, Tuscaloosa (2006)
95.
Zurück zum Zitat Fink, A.H., Wilson, W.A., Holte, R.T.: System and methods for countering satellite-navigated munitions, December 20 2016. US Patent 9,523,773 Fink, A.H., Wilson, W.A., Holte, R.T.: System and methods for countering satellite-navigated munitions, December 20 2016. US Patent 9,523,773
96.
Zurück zum Zitat Ahner, D., McCarthy, A.: Response surface modeling of precision-guided fragmentation munitions. J. Def. Model. Simul. 17(1), 83–97 (2020) Ahner, D., McCarthy, A.: Response surface modeling of precision-guided fragmentation munitions. J. Def. Model. Simul. 17(1), 83–97 (2020)
97.
Zurück zum Zitat O’Donohue, Commander Mark: Autonomous underwater vehicles. Niobe Papers 9(11) (2020) O’Donohue, Commander Mark: Autonomous underwater vehicles. Niobe Papers 9(11) (2020)
98.
Zurück zum Zitat Keane, J., Joiner, K.: Experimental test and evaluation of autonomous underwater vehicles. Aust. J. Multi-Discip. Eng. 16(1), 67–79 (2020) Keane, J., Joiner, K.: Experimental test and evaluation of autonomous underwater vehicles. Aust. J. Multi-Discip. Eng. 16(1), 67–79 (2020)
99.
Zurück zum Zitat Nasu, H., Letts, D.: The legal characterization of lethal autonomous maritime systems: warship, torpedo, or naval mine? Int. Law Stud. 96(1), 4 (2020) Nasu, H., Letts, D.: The legal characterization of lethal autonomous maritime systems: warship, torpedo, or naval mine? Int. Law Stud. 96(1), 4 (2020)
100.
Zurück zum Zitat Mvelle, G.: Fighting piracy in the gulf of guinea: small states’ pursuit of strategic autonomy. Revue internationale et strategique 2, 35–46 (2020) Mvelle, G.: Fighting piracy in the gulf of guinea: small states’ pursuit of strategic autonomy. Revue internationale et strategique 2, 35–46 (2020)
101.
Zurück zum Zitat Broohm, D.A., Wang, G., Gao, J.: Maritime security: a new strategy for merchant shipping to avoid piracy in the Gulf of Guinea. Open J. Soc. Sci. 8(5), 392–410 (2020) Broohm, D.A., Wang, G., Gao, J.: Maritime security: a new strategy for merchant shipping to avoid piracy in the Gulf of Guinea. Open J. Soc. Sci. 8(5), 392–410 (2020)
102.
Zurück zum Zitat Grasso, R., Braca, P., Osler, J., Hansen, J.: Asset network planning: integration of environmental data and sensor performance for counter piracy. In: 21st European Signal Processing Conference (EUSIPCO 2013), pp. 1–5. IEEE (2013) Grasso, R., Braca, P., Osler, J., Hansen, J.: Asset network planning: integration of environmental data and sensor performance for counter piracy. In: 21st European Signal Processing Conference (EUSIPCO 2013), pp. 1–5. IEEE (2013)
103.
Zurück zum Zitat Karahalios, H.: Appraisal of a ship’s cybersecurity efficiency: the case of piracy. J. Transp. Secur. 13, 1–23 (2020) Karahalios, H.: Appraisal of a ship’s cybersecurity efficiency: the case of piracy. J. Transp. Secur. 13, 1–23 (2020)
104.
Zurück zum Zitat AU African Union, COIN Counterinsurgency, and CT Counterterrorism. Ctf counter terrorist financing ctf 150 combined task force 150 cwc chemical weapons convention dfg deutsche forschungsgemeinschaft/German research foundation AU African Union, COIN Counterinsurgency, and CT Counterterrorism. Ctf counter terrorist financing ctf 150 combined task force 150 cwc chemical weapons convention dfg deutsche forschungsgemeinschaft/German research foundation
105.
Zurück zum Zitat Beccaro, A.: Isis in mosul and sirte: differences and similarities. Mediterr. Polit. 23(3), 410–417 (2018) Beccaro, A.: Isis in mosul and sirte: differences and similarities. Mediterr. Polit. 23(3), 410–417 (2018)
106.
Zurück zum Zitat Bunker, R.J.: Keshavarz. Terrorist and insurgent teleoperated sniper rifles and machine guns, Alma (2016) Bunker, R.J.: Keshavarz. Terrorist and insurgent teleoperated sniper rifles and machine guns, Alma (2016)
107.
Zurück zum Zitat Beccaro, A.: Isis in Libya and beyond, 2014–2016. J. N. Afr. Stud. 1–20 (2020) Beccaro, A.: Isis in Libya and beyond, 2014–2016. J. N. Afr. Stud. 1–20 (2020)
108.
Zurück zum Zitat Gibbons-Neff, T.: Isis drones are attacking us troops and disrupting airstrikes in Raqqa, officials say. Washington Post 14 (2017) Gibbons-Neff, T.: Isis drones are attacking us troops and disrupting airstrikes in Raqqa, officials say. Washington Post 14 (2017)
109.
Zurück zum Zitat Hoenig, M.: Hezbollah and the use of drones as a weapon of terrorism. Public Interest Rep. 67(2) (2014) Hoenig, M.: Hezbollah and the use of drones as a weapon of terrorism. Public Interest Rep. 67(2) (2014)
110.
Zurück zum Zitat Stalinsky, S., Sosnow, R.: A decade of jihadi organizations’ use of drones—from early experiments by Hizbullah, Hamas, and Al-Qaeda to emerging national security crisis for the west as ISIS launches first attack drones. MEMRI-The Middle East Media Research Institute. February, 21 (2017) Stalinsky, S., Sosnow, R.: A decade of jihadi organizations’ use of drones—from early experiments by Hizbullah, Hamas, and Al-Qaeda to emerging national security crisis for the west as ISIS launches first attack drones. MEMRI-The Middle East Media Research Institute. February, 21 (2017)
111.
Zurück zum Zitat Shay, S.: The Houthi Maritime Threats in the Red Sea Basin, vol. 9. Institute for Policy and Strategy (2017) Shay, S.: The Houthi Maritime Threats in the Red Sea Basin, vol. 9. Institute for Policy and Strategy (2017)
112.
Zurück zum Zitat Rossiter, A.: Drone usage by militant groups: exploring variation in adoption. Def. Secur. Anal. 34(2), 113–126 (2018) MathSciNet Rossiter, A.: Drone usage by militant groups: exploring variation in adoption. Def. Secur. Anal. 34(2), 113–126 (2018) MathSciNet
113.
114.
Zurück zum Zitat Archambault, E., Veilleux-Lepage, Y.: Drone imagery in Islamic state propaganda: flying like a state. Int. Aff. 96(4), 955–973 (2020) Archambault, E., Veilleux-Lepage, Y.: Drone imagery in Islamic state propaganda: flying like a state. Int. Aff. 96(4), 955–973 (2020)
115.
Zurück zum Zitat Naudé, W.: Artificial intelligence vs covid-19: limitations, constraints and pitfalls. Ai & Society, p. 1 (2020) Naudé, W.: Artificial intelligence vs covid-19: limitations, constraints and pitfalls. Ai & Society, p. 1 (2020)
116.
Zurück zum Zitat Moon, M.J.: Fighting COVID-19 with agility, transparency, and participation: Wicked policy problems and new governance challenges. Public Adm. Rev. 80(4), 651–656 (2020) Moon, M.J.: Fighting COVID-19 with agility, transparency, and participation: Wicked policy problems and new governance challenges. Public Adm. Rev. 80(4), 651–656 (2020)
117.
Zurück zum Zitat Yakas, B.: Faa investigating” anti-covid-19 volunteer drone” filmed admonishing people in nyc (2020) Yakas, B.: Faa investigating” anti-covid-19 volunteer drone” filmed admonishing people in nyc (2020)
118.
Zurück zum Zitat Scott, J.E., Scott, C.H.: Models for drone delivery of medications and other healthcare items. In: Unmanned Aerial Vehicles: Breakthroughs in Research and Practice, pp. 376–392. IGI Global (2019) Scott, J.E., Scott, C.H.: Models for drone delivery of medications and other healthcare items. In: Unmanned Aerial Vehicles: Breakthroughs in Research and Practice, pp. 376–392. IGI Global (2019)
119.
Zurück zum Zitat Ye, J.: The role of health technology and informatics in a global public health emergency: practices and implications from the covid-19 pandemic. JMIR Med. Inform. 8(7), e19866 (2020) Ye, J.: The role of health technology and informatics in a global public health emergency: practices and implications from the covid-19 pandemic. JMIR Med. Inform. 8(7), e19866 (2020)
120.
Zurück zum Zitat Abubakar, A.I., Omeke, K.G.,Öztürk, M., Hussain, S. and Imran, M.A.: The role of artificial intelligence driven 5G networks in COVID-19 outbreak: opportunities, challenges, and future outlook. Front. Comms. Net. (2020) Abubakar, A.I., Omeke, K.G.,Öztürk, M., Hussain, S. and Imran, M.A.: The role of artificial intelligence driven 5G networks in COVID-19 outbreak: opportunities, challenges, and future outlook. Front. Comms. Net. (2020)
121.
Zurück zum Zitat Nair, V.V.: Drones as futuristic crime prevention strategy: situational review during covid-19 lockdown. J. Soc. Sci. 64(1–3), 22–29 (2020) Nair, V.V.: Drones as futuristic crime prevention strategy: situational review during covid-19 lockdown. J. Soc. Sci. 64(1–3), 22–29 (2020)
122.
Zurück zum Zitat Jat, D.S., Singh, C.: Artificial intelligence-enabled robotic drones for covid-19 outbreak. In: Intelligent Systems and Methods to Combat Covid-19, pp. 37–46. Springer (2020) Jat, D.S., Singh, C.: Artificial intelligence-enabled robotic drones for covid-19 outbreak. In: Intelligent Systems and Methods to Combat Covid-19, pp. 37–46. Springer (2020)
123.
Zurück zum Zitat Oguamanam, C.: Covid-19 and Africa: does one size fit all in public health intervention? Vulnerable: The Policy, Law and Ethics of COVID-19.University of Ottawa Press, Ottawa (2020) ( Forthcoming in 2020) Oguamanam, C.: Covid-19 and Africa: does one size fit all in public health intervention? Vulnerable: The Policy, Law and Ethics of COVID-19.University of Ottawa Press, Ottawa (2020) ( Forthcoming in 2020)
124.
Zurück zum Zitat Vafea, M.T., Atalla, E., Georgakas, J., Shehadeh, F., Mylona, E.K., Kalligeros, M., Mylonakis, E.: Emerging technologies for use in the study, diagnosis, and treatment of patients with covid-19. Cell. Mol. Bioeng. 13(4), 249–257 (2020) Vafea, M.T., Atalla, E., Georgakas, J., Shehadeh, F., Mylona, E.K., Kalligeros, M., Mylonakis, E.: Emerging technologies for use in the study, diagnosis, and treatment of patients with covid-19. Cell. Mol. Bioeng. 13(4), 249–257 (2020)
125.
Zurück zum Zitat Zeng, Z., Chen, P.-J., Lew, A.A.: From high-touch to high-tech: Covid-19 drives robotics adoption. Tour. Geogr. 22, 1–11 (2020) Zeng, Z., Chen, P.-J., Lew, A.A.: From high-touch to high-tech: Covid-19 drives robotics adoption. Tour. Geogr. 22, 1–11 (2020)
126.
Zurück zum Zitat Bhaskar, S., Bradley, S., Sakhamuri, S., Moguilner, S., Chattu, V.K., Pandya, S., Schroeder, S., Ray, D., Banach, M.: Designing futuristic telemedicine using artificial intelligence and robotics in the covid-19 era. Front. Public Health 8, 708 (2020) Bhaskar, S., Bradley, S., Sakhamuri, S., Moguilner, S., Chattu, V.K., Pandya, S., Schroeder, S., Ray, D., Banach, M.: Designing futuristic telemedicine using artificial intelligence and robotics in the covid-19 era. Front. Public Health 8, 708 (2020)
127.
Zurück zum Zitat Odekerken-Schröder, G., Mele, C., Russo-Spena, T., Mahr, D., Ruggiero, A.: Mitigating loneliness with companion robots in the covid-19 pandemic and beyond: an integrative framework and research agenda. J. Serv. Manag. (2020) Odekerken-Schröder, G., Mele, C., Russo-Spena, T., Mahr, D., Ruggiero, A.: Mitigating loneliness with companion robots in the covid-19 pandemic and beyond: an integrative framework and research agenda. J. Serv. Manag. (2020)
128.
Zurück zum Zitat Bhardwaj, A., Avasthi, V., Goundar, S.: Cyber security attacks on robotic platforms. Netw. Secur. 2019(10), 13–19 (2019) Bhardwaj, A., Avasthi, V., Goundar, S.: Cyber security attacks on robotic platforms. Netw. Secur. 2019(10), 13–19 (2019)
129.
Zurück zum Zitat Wang, C., Carzaniga, A., Evans, D., Wolf, A.: Security issues and requirements for internet-scale publish-subscribe systems. In: HICSS, p. 303. IEEE (2002) Wang, C., Carzaniga, A., Evans, D., Wolf, A.: Security issues and requirements for internet-scale publish-subscribe systems. In: HICSS, p. 303. IEEE (2002)
130.
Zurück zum Zitat Esposito, C., Ciampi, M.: On security in publish/subscribe services: a survey. IEEE Commun. Surv. Tutor. 17(2), 966–997 (2015) Esposito, C., Ciampi, M.: On security in publish/subscribe services: a survey. IEEE Commun. Surv. Tutor. 17(2), 966–997 (2015)
131.
Zurück zum Zitat Dzung, D., Naedele, M., Von Hoff, T.P., Crevatin, M.: Security for industrial communication systems. Proc. IEEE 93(6), 1152–1177 (2005) Dzung, D., Naedele, M., Von Hoff, T.P., Crevatin, M.: Security for industrial communication systems. Proc. IEEE 93(6), 1152–1177 (2005)
132.
Zurück zum Zitat Laitinen, A., Niemelä, M., Pirhonen, J.: Demands of dignity in robotic care: recognizing vulnerability, agency, and subjectivity in robot-based, robot-assisted, and teleoperated elderly care. Tech. Res. Philos. Technol. 23(3), 366–401 (2019) Laitinen, A., Niemelä, M., Pirhonen, J.: Demands of dignity in robotic care: recognizing vulnerability, agency, and subjectivity in robot-based, robot-assisted, and teleoperated elderly care. Tech. Res. Philos. Technol. 23(3), 366–401 (2019)
133.
Zurück zum Zitat Choi, H., Kate, S., Aafer, Y., Zhang, X., Xu, D.: Cyber-physical inconsistency vulnerability identification for safety checks in robotic vehicles. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 263–278 (2020) Choi, H., Kate, S., Aafer, Y., Zhang, X., Xu, D.: Cyber-physical inconsistency vulnerability identification for safety checks in robotic vehicles. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 263–278 (2020)
134.
Zurück zum Zitat Atamli, A.W., Martin, A.: Threat-based security analysis for the internet of things. In: 2014 International Workshop on Secure Internet of Things (SIoT), pp. 35–43. IEEE (2014) Atamli, A.W., Martin, A.: Threat-based security analysis for the internet of things. In: 2014 International Workshop on Secure Internet of Things (SIoT), pp. 35–43. IEEE (2014)
135.
Zurück zum Zitat Hou, T., Wang, V.: Industrial espionage-a systematic literature review (slr). Comput. Secur. 98, 102019 (2020) Hou, T., Wang, V.: Industrial espionage-a systematic literature review (slr). Comput. Secur. 98, 102019 (2020)
136.
Zurück zum Zitat Siman-Tov, D., Even, S.: A new level in the cyber war between Israel and Iran. INSS Insight (1328) (2020) Siman-Tov, D., Even, S.: A new level in the cyber war between Israel and Iran. INSS Insight (1328) (2020)
137.
Zurück zum Zitat Losa, L.: The impact of cyber capabilities on the Israeli–Iranian relationship (2020) Losa, L.: The impact of cyber capabilities on the Israeli–Iranian relationship (2020)
138.
Zurück zum Zitat Kaye, D.D., Efron, S.: Israel’s evolving Iran policy. Survival 62(4), 7–30 (2020) Kaye, D.D., Efron, S.: Israel’s evolving Iran policy. Survival 62(4), 7–30 (2020)
139.
Zurück zum Zitat Yousef, K.M.A., AlMajali, A., Ghalyon, S.A., Dweik, W., Mohd, B.J.: Analyzing cyber-physical threats on robotic platforms. Sensors 18(5), 1643 (2018) Yousef, K.M.A., AlMajali, A., Ghalyon, S.A., Dweik, W., Mohd, B.J.: Analyzing cyber-physical threats on robotic platforms. Sensors 18(5), 1643 (2018)
140.
Zurück zum Zitat Eun, Y.-S., Aßmann, J.S.: Cyberwar: taking stock of security and warfare in the digital age. Int. Stud. Perspect. 17(3), 343–360 (2016) Eun, Y.-S., Aßmann, J.S.: Cyberwar: taking stock of security and warfare in the digital age. Int. Stud. Perspect. 17(3), 343–360 (2016)
141.
Zurück zum Zitat Geerts, M.: Digitalization combined with organizational process innovation. The solution to the risk of industrial espionage? (2020) Geerts, M.: Digitalization combined with organizational process innovation. The solution to the risk of industrial espionage? (2020)
142.
Zurück zum Zitat Klebanov, L.R., Polubinskaya, S.V.: Computer technologies for committing sabotage and terrorism. RUDN J. Law 24(3), 717–734 (2020) Klebanov, L.R., Polubinskaya, S.V.: Computer technologies for committing sabotage and terrorism. RUDN J. Law 24(3), 717–734 (2020)
144.
Zurück zum Zitat Sollins, K.R.: Iot big data security and privacy vs. innovation. IEEE Internet Things J. 6, 1–1 (2019) Sollins, K.R.: Iot big data security and privacy vs. innovation. IEEE Internet Things J. 6, 1–1 (2019)
145.
Zurück zum Zitat Noura, H.N., Hatoum, T., Salman, O., Yaacoub, J.-P., Chehab, A.: Lorawan security survey: issues, threats and possible mitigation techniques. Internet of Things, p. 100303 (2020) Noura, H.N., Hatoum, T., Salman, O., Yaacoub, J.-P., Chehab, A.: Lorawan security survey: issues, threats and possible mitigation techniques. Internet of Things, p. 100303 (2020)
146.
Zurück zum Zitat Salamai, A., Hussain, O.K., Saberi, M., Chang, E., Hussain, F.K.: Highlighting the importance of considering the impacts of both external and internal risk factors on operational parameters to improve supply chain risk management. IEEE Access 7, 49297–49315 (2019) Salamai, A., Hussain, O.K., Saberi, M., Chang, E., Hussain, F.K.: Highlighting the importance of considering the impacts of both external and internal risk factors on operational parameters to improve supply chain risk management. IEEE Access 7, 49297–49315 (2019)
147.
Zurück zum Zitat Priyadarshini, I.: Cyber security risks in robotics. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 1235–1250. IGI Global (2018) Priyadarshini, I.: Cyber security risks in robotics. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 1235–1250. IGI Global (2018)
148.
Zurück zum Zitat Sobb, T., Turnbull, B., Moustafa, N.: Supply chain 4.0: a survey of cyber security challenges, solutions and future directions. Electronics 9(11), 1864 (2020) Sobb, T., Turnbull, B., Moustafa, N.: Supply chain 4.0: a survey of cyber security challenges, solutions and future directions. Electronics 9(11), 1864 (2020)
149.
Zurück zum Zitat Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for IoT security. Digit. Commun. Netw. 6(2), 195–202 (2020) Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for IoT security. Digit. Commun. Netw. 6(2), 195–202 (2020)
150.
Zurück zum Zitat Gaikwad, N.B., Ugale, H., Keskar, A., Shivaprakash, N.C.: The internet of battlefield things (IoBT) based enemy localization using soldiers location and gunshot direction. IEEE Internet of Things J. 7(12), 11725–11734 (2020) Gaikwad, N.B., Ugale, H., Keskar, A., Shivaprakash, N.C.: The internet of battlefield things (IoBT) based enemy localization using soldiers location and gunshot direction. IEEE Internet of Things J. 7(12), 11725–11734 (2020)
151.
Zurück zum Zitat Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010) Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)
152.
Zurück zum Zitat Wang, X., Mal-Sarkar, T., Krishna, A., Narasimhan, S., Bhunia, S.: Software exploitable hardware Trojans in embedded processor. In: 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), pp. 55–58. IEEE (2012) Wang, X., Mal-Sarkar, T., Krishna, A., Narasimhan, S., Bhunia, S.: Software exploitable hardware Trojans in embedded processor. In: 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), pp. 55–58. IEEE (2012)
153.
Zurück zum Zitat Elmiligi, H., Gebali, F., El-Kharashi, M.W.: Multi-dimensional analysis of embedded systems security. Microprocess. Microsyst. 41, 29–36 (2016) Elmiligi, H., Gebali, F., El-Kharashi, M.W.: Multi-dimensional analysis of embedded systems security. Microprocess. Microsyst. 41, 29–36 (2016)
154.
Zurück zum Zitat Clark, G.W., Doran, M.V., Andel, T.R.: Cybersecurity issues in robotics. In: 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 1–5. IEEE (2017) Clark, G.W., Doran, M.V., Andel, T.R.: Cybersecurity issues in robotics. In: 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 1–5. IEEE (2017)
155.
Zurück zum Zitat Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. White paper, Symantec Corp., Security Response 5(6), 29 (2011) Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. White paper, Symantec Corp., Security Response 5(6), 29 (2011)
156.
Zurück zum Zitat Goyal, R., Sharma, S., Bevinakoppa, S., Watters, P.: Obfuscation of stuxnet and flame malware. Latest Trends Appl. Inform. Comput. 150, 154 (2012) Goyal, R., Sharma, S., Bevinakoppa, S., Watters, P.: Obfuscation of stuxnet and flame malware. Latest Trends Appl. Inform. Comput. 150, 154 (2012)
157.
Zurück zum Zitat Bencsáth, B., Pék, G., Buttyán, L., Felegyhazi, M.: The cousins of stuxnet: Duqu, flame, and gauss. Future Internet 4(4), 971–1003 (2012) Bencsáth, B., Pék, G., Buttyán, L., Felegyhazi, M.: The cousins of stuxnet: Duqu, flame, and gauss. Future Internet 4(4), 971–1003 (2012)
158.
Zurück zum Zitat Kamiński, M.A.: Operation “olympic games.” Cyber-sabotage as a tool of American intelligence aimed at counteracting the development of Iran’s nuclear programme. Secur. Def. Q. 29(2), 63–71 (2020) Kamiński, M.A.: Operation “olympic games.” Cyber-sabotage as a tool of American intelligence aimed at counteracting the development of Iran’s nuclear programme. Secur. Def. Q. 29(2), 63–71 (2020)
159.
Zurück zum Zitat Horschig, D.: Cyber-weapons in nuclear counter-proliferation. Def. Secur. Anal. 36(3), 352–371 (2020) Horschig, D.: Cyber-weapons in nuclear counter-proliferation. Def. Secur. Anal. 36(3), 352–371 (2020)
160.
Zurück zum Zitat Fruhlinger, J.: What is wannacry ransomware, how does it infect, and who was responsible (2017) Fruhlinger, J.: What is wannacry ransomware, how does it infect, and who was responsible (2017)
161.
Zurück zum Zitat Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson, Upper Saddle River (2017) Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson, Upper Saddle River (2017)
162.
Zurück zum Zitat Monikandan, S., Arockiam, L.: Confidentiality technique to enhance security of data in public cloud storage using data obfuscation. Indian J. Sci. Technol. 8(24), 1 (2015) Monikandan, S., Arockiam, L.: Confidentiality technique to enhance security of data in public cloud storage using data obfuscation. Indian J. Sci. Technol. 8(24), 1 (2015)
163.
Zurück zum Zitat Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. Proceedings, pp. 72–84. IEEE (1992) Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. Proceedings, pp. 72–84. IEEE (1992)
164.
Zurück zum Zitat Irani, D., Balduzzi, M., Balzarotti, D., Kirda, E., Pu, C.: Reverse social engineering attacks in online social networks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 55–74. Springer (2011) Irani, D., Balduzzi, M., Balzarotti, D., Kirda, E., Pu, C.: Reverse social engineering attacks in online social networks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 55–74. Springer (2011)
165.
Zurück zum Zitat Khan, M.H., Shah, M.A.: Survey on security threats of smartphones in internet of things. In: 2016 22nd International Conference on Automation and Computing (ICAC), pp. 560–566. IEEE (2016) Khan, M.H., Shah, M.A.: Survey on security threats of smartphones in internet of things. In: 2016 22nd International Conference on Automation and Computing (ICAC), pp. 560–566. IEEE (2016)
166.
Zurück zum Zitat Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 272–280. ACM (2003) Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 272–280. ACM (2003)
167.
Zurück zum Zitat Miller, J., Williams, A.B., Perouli, D.: A case study on the cybersecurity of social robots. In: Companion of the 2018 ACM/IEEE International Conference on Human–Robot Interaction, pp. 195–196. ACM (2018) Miller, J., Williams, A.B., Perouli, D.: A case study on the cybersecurity of social robots. In: Companion of the 2018 ACM/IEEE International Conference on Human–Robot Interaction, pp. 195–196. ACM (2018)
168.
Zurück zum Zitat Shahbaznezhad, H., Kolini, F., Rashidirad, M.: Employees’ behavior in phishing attacks: what individual, organizational, and technological factors matter? J. Comput. Inf. Syst. 1–12 (2020) Shahbaznezhad, H., Kolini, F., Rashidirad, M.: Employees’ behavior in phishing attacks: what individual, organizational, and technological factors matter? J. Comput. Inf. Syst. 1–12 (2020)
169.
Zurück zum Zitat Alabdan, R.: Phishing attacks survey: types, vectors, and technical approaches. Future Internet 12(10), 168 (2020) Alabdan, R.: Phishing attacks survey: types, vectors, and technical approaches. Future Internet 12(10), 168 (2020)
170.
Zurück zum Zitat Mo, Y., Garone, E., Casavola, A., Sinopoli, B.: False data injection attacks against state estimation in wireless sensor networks. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 5967–5972. IEEE (2010) Mo, Y., Garone, E., Casavola, A., Sinopoli, B.: False data injection attacks against state estimation in wireless sensor networks. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 5967–5972. IEEE (2010)
171.
Zurück zum Zitat Senie, D., Ferguson, P.: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. Network (1998) Senie, D., Ferguson, P.: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. Network (1998)
172.
Zurück zum Zitat Gu, Q.: Packet-dropping attack. In: Encyclopedia of Cryptography and Security, pp. 899–902. Springer (2011) Gu, Q.: Packet-dropping attack. In: Encyclopedia of Cryptography and Security, pp. 899–902. Springer (2011)
173.
Zurück zum Zitat Navas, R.E., Le Bouder, H., Cuppens, N., Cuppens, F., Papadopoulos, G.Z.: Do not trust your neighbors! a small IoT platform illustrating a man-in-the-middle attack. In: International Conference on Ad-Hoc Networks and Wireless, pp. 120–125. Springer (2018) Navas, R.E., Le Bouder, H., Cuppens, N., Cuppens, F., Papadopoulos, G.Z.: Do not trust your neighbors! a small IoT platform illustrating a man-in-the-middle attack. In: International Conference on Ad-Hoc Networks and Wireless, pp. 120–125. Springer (2018)
174.
Zurück zum Zitat Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning (2017). arXiv preprint arXiv:​1712.​05526 Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning (2017). arXiv preprint arXiv:​1712.​05526
175.
Zurück zum Zitat Alemzadeh, H., Chen, D., Li, X., Kesavadas, T., Kalbarczyk, Z.T., Iyer, R.K.: Targeted attacks on teleoperated surgical robots: dynamic model-based detection and mitigation. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 395–406. IEEE (2016) Alemzadeh, H., Chen, D., Li, X., Kesavadas, T., Kalbarczyk, Z.T., Iyer, R.K.: Targeted attacks on teleoperated surgical robots: dynamic model-based detection and mitigation. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 395–406. IEEE (2016)
176.
Zurück zum Zitat Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009) Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)
177.
Zurück zum Zitat Blackwell, T., Casner, D., Nelson, B., Wiley, S.: Self-balancing robot including an ultracapacitor power source, October 18 2011. US Patent 8,041,456 Blackwell, T., Casner, D., Nelson, B., Wiley, S.: Self-balancing robot including an ultracapacitor power source, October 18 2011. US Patent 8,041,456
178.
Zurück zum Zitat Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. 4(1), 65–88 (2015) Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. 4(1), 65–88 (2015)
179.
Zurück zum Zitat Rajendran, J., Kanuparthi, A.K., Zahran, M., Addepalli, S.K., Ormazabal, G., Karri, R.: Securing processors against insider attacks: a circuit-microarchitecture co-design approach. IEEE Des. Test 30(2), 35–44 (2013) Rajendran, J., Kanuparthi, A.K., Zahran, M., Addepalli, S.K., Ormazabal, G., Karri, R.: Securing processors against insider attacks: a circuit-microarchitecture co-design approach. IEEE Des. Test 30(2), 35–44 (2013)
181.
Zurück zum Zitat Mansor, H., Markantonakis, K., Akram, R.N., Mayes, K.: Don’t brick your car: firmware confidentiality and rollback for vehicles. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 139–148. IEEE (2015) Mansor, H., Markantonakis, K., Akram, R.N., Mayes, K.: Don’t brick your car: firmware confidentiality and rollback for vehicles. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 139–148. IEEE (2015)
182.
Zurück zum Zitat Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: Third International Conference on Emerging Security Information, Systems and Technologies, 2009. SECURWARE’09, pp. 268–273. IEEE (2009) Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: Third International Conference on Emerging Security Information, Systems and Technologies, 2009. SECURWARE’09, pp. 268–273. IEEE (2009)
183.
Zurück zum Zitat Yih-Chun, H., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006) Yih-Chun, H., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
184.
Zurück zum Zitat Baccelli, E., Hahm, O., Gunes, M., Wahlisch, M., Schmidt, T.C.: Riot os: Towards an os for the internet of things. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 79–80. IEEE (2013) Baccelli, E., Hahm, O., Gunes, M., Wahlisch, M., Schmidt, T.C.: Riot os: Towards an os for the internet of things. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 79–80. IEEE (2013)
185.
Zurück zum Zitat Azar, C., Brostoff, G.: System and method for providing secure access to an electronic device using continuous facial biometrics, February 5 2013. US Patent 8,370,639 Azar, C., Brostoff, G.: System and method for providing secure access to an electronic device using continuous facial biometrics, February 5 2013. US Patent 8,370,639
186.
Zurück zum Zitat Azar, C., Brostoff, G.: System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics, January 7 2014. US Patent 8,627,096 Azar, C., Brostoff, G.: System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics, January 7 2014. US Patent 8,627,096
187.
Zurück zum Zitat Tasevski, P.: Password Attacks and Generation Strategies. Tartu University, Faculty of Mathematics and Computer Sciences, Tartu (2011) Tasevski, P.: Password Attacks and Generation Strategies. Tartu University, Faculty of Mathematics and Computer Sciences, Tartu (2011)
189.
Zurück zum Zitat Neumann, P.G.: Denial-of-service attacks. Commun. ACM 43(4), 136–136 (2000) Neumann, P.G.: Denial-of-service attacks. Commun. ACM 43(4), 136–136 (2000)
190.
Zurück zum Zitat Side-Channel Attacks. Side-channel attacks Side-Channel Attacks. Side-channel attacks
191.
Zurück zum Zitat Amoozadeh, M., Raghuramu, A., Chuah, C.-N., Ghosal, D., Zhang, H.M., Rowe, J., Levitt, K.: Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53(6), 126–132 (2015) Amoozadeh, M., Raghuramu, A., Chuah, C.-N., Ghosal, D., Zhang, H.M., Rowe, J., Levitt, K.: Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53(6), 126–132 (2015)
192.
Zurück zum Zitat Chesaux, J.: Wireless access point spoofing and mobile devices geolocation using swarms of flying robots. Master optional semester project, Spring (2014) Chesaux, J.: Wireless access point spoofing and mobile devices geolocation using swarms of flying robots. Master optional semester project, Spring (2014)
193.
Zurück zum Zitat Kaufman, C.W., Pearlman, R.J., Gasser, M.: System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens, February 13 1996. US Patent 5,491,752 Kaufman, C.W., Pearlman, R.J., Gasser, M.: System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens, February 13 1996. US Patent 5,491,752
194.
Zurück zum Zitat Barcena, M.B., Wueest, C.: Insecurity in the internet of things. Security Response, Symantec (2015) Barcena, M.B., Wueest, C.: Insecurity in the internet of things. Security Response, Symantec (2015)
195.
Zurück zum Zitat Kumar, R., Pattnaik, P.K., Pandey, P.: Detecting and Mitigating Robotic Cyber Security Risks. IGI Global, Hershey (2017) Kumar, R., Pattnaik, P.K., Pandey, P.: Detecting and Mitigating Robotic Cyber Security Risks. IGI Global, Hershey (2017)
196.
Zurück zum Zitat Schultz, E.E., Ray, E.: Rootkits: the ultimate malware threat. Inf. Secur. Manag. Handb. 2, 175 (2008) Schultz, E.E., Ray, E.: Rootkits: the ultimate malware threat. Inf. Secur. Manag. Handb. 2, 175 (2008)
197.
Zurück zum Zitat Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing, pp. 105–114. ACM (2009) Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of the 11th International Conference on Ubiquitous Computing, pp. 105–114. ACM (2009)
198.
Zurück zum Zitat Jiang, D., Omote, K.: An approach to detect remote access trojan in the early stage of communication. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA), pp. 706–713. IEEE (2015) Jiang, D., Omote, K.: An approach to detect remote access trojan in the early stage of communication. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA), pp. 706–713. IEEE (2015)
199.
Zurück zum Zitat Maglaras, L.A., Jiang, J.: Intrusion detection in Scada systems using machine learning techniques. In: Science and Information Conference (SAI), 2014, pp. 626–631. IEEE (2014) Maglaras, L.A., Jiang, J.: Intrusion detection in Scada systems using machine learning techniques. In: Science and Information Conference (SAI), 2014, pp. 626–631. IEEE (2014)
200.
Zurück zum Zitat Block, J.: A laws of war review of contemporary land-based missile defence system ‘iron dome’. Sci. Mil. S. Afr. J. Mil. Stud. 45(2), 105–128 (2017) Block, J.: A laws of war review of contemporary land-based missile defence system ‘iron dome’. Sci. Mil. S. Afr. J. Mil. Stud. 45(2), 105–128 (2017)
201.
Zurück zum Zitat Schneider, P., IFSH Hamburg: Recent trends in global maritime terrorism. Marit. Secur. Count. Terror. Lessons Marit. Piracy Narc. Interdiction 150, 187 (2020) Schneider, P., IFSH Hamburg: Recent trends in global maritime terrorism. Marit. Secur. Count. Terror. Lessons Marit. Piracy Narc. Interdiction 150, 187 (2020)
202.
Zurück zum Zitat Patterson, D.A., Bridgelall, R.: Attack risk modelling for the San Diego maritime facilities. Mar. Policy 104210 (2020) Patterson, D.A., Bridgelall, R.: Attack risk modelling for the San Diego maritime facilities. Mar. Policy 104210 (2020)
203.
Zurück zum Zitat Morris, I.: War! what is it good for?: conflict and the progress of civilization from primates to robots. Farrar, Straus and Giroux (2014) Morris, I.: War! what is it good for?: conflict and the progress of civilization from primates to robots. Farrar, Straus and Giroux (2014)
204.
Zurück zum Zitat Button, M.: Economic and industrial espionage (2020) Button, M.: Economic and industrial espionage (2020)
205.
Zurück zum Zitat Oruc, A., Sc MIET MIMarEST, M.: Claims of state-sponsored cyberattack in the maritime industry Oruc, A., Sc MIET MIMarEST, M.: Claims of state-sponsored cyberattack in the maritime industry
207.
Zurück zum Zitat Vermeulen, B., Pyka, A., Saviotti, P.P.: A taxonomic structural change perspective on the economic impact of robots and artificial intelligence on creative work. In: The Future of Creative Work. Edward Elgar Publishing (2020) Vermeulen, B., Pyka, A., Saviotti, P.P.: A taxonomic structural change perspective on the economic impact of robots and artificial intelligence on creative work. In: The Future of Creative Work. Edward Elgar Publishing (2020)
208.
Zurück zum Zitat Cooper, A.: How robots change the world; what automation really means for jobs and productivity. Technical report (Tech. Rep.). Oxford Economics, Oxford (2019) Cooper, A.: How robots change the world; what automation really means for jobs and productivity. Technical report (Tech. Rep.). Oxford Economics, Oxford (2019)
209.
Zurück zum Zitat Acemoglu, D., Restrepo, P.: Robots and jobs: evidence from US labor markets. J. Polit. Econ. 128(6), 2188–2244 (2020) Acemoglu, D., Restrepo, P.: Robots and jobs: evidence from US labor markets. J. Polit. Econ. 128(6), 2188–2244 (2020)
210.
Zurück zum Zitat Alemzadeh, H., Raman, J., Leveson, N., Kalbarczyk, Z., Iyer, R.K.: Adverse events in robotic surgery: a retrospective study of 14 years of FDA data. PloS one 11(4), e0151470 (2016) Alemzadeh, H., Raman, J., Leveson, N., Kalbarczyk, Z., Iyer, R.K.: Adverse events in robotic surgery: a retrospective study of 14 years of FDA data. PloS one 11(4), e0151470 (2016)
211.
Zurück zum Zitat Bloomfield, R.E.G.: Bullets to bytes: defending the United Kingdom in cyberspace (2019) Bloomfield, R.E.G.: Bullets to bytes: defending the United Kingdom in cyberspace (2019)
212.
Zurück zum Zitat Rotjan, R.D., Blum, J., Lewis, S.M.: Shell choice in pagurus longicarpus hermit crabs: does predation threat influence shell selection behavior? Behav. Ecol. Sociobiol. 56(2), 171–176 (2004) Rotjan, R.D., Blum, J., Lewis, S.M.: Shell choice in pagurus longicarpus hermit crabs: does predation threat influence shell selection behavior? Behav. Ecol. Sociobiol. 56(2), 171–176 (2004)
213.
Zurück zum Zitat Peterson, A.: Yes, terrorists could have hacked Dick Cheney’s heart. Washington Post (2013) Peterson, A.: Yes, terrorists could have hacked Dick Cheney’s heart. Washington Post (2013)
214.
Zurück zum Zitat Senthilkumar, K.S., Pirapaharan, K., Julai, N., Hoole, P.R.P., Othman, A.-H., Harikrishnan, R., Hoole, S.R.H.: Perceptron ANN control of array sensors and transmitters with different activation functions for 5g wireless systems. In: 2017 International Conference on Signal Processing and Communication (ICSPC), pp. 107–111. IEEE (2017) Senthilkumar, K.S., Pirapaharan, K., Julai, N., Hoole, P.R.P., Othman, A.-H., Harikrishnan, R., Hoole, S.R.H.: Perceptron ANN control of array sensors and transmitters with different activation functions for 5g wireless systems. In: 2017 International Conference on Signal Processing and Communication (ICSPC), pp. 107–111. IEEE (2017)
215.
Zurück zum Zitat Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, pp. 77–92. San Francisco (2011) Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, pp. 77–92. San Francisco (2011)
216.
Zurück zum Zitat Turner, A., Glantz, K., Gall, J.: A practitioner-researcher partnership to develop and deliver operational value of threat, risk and vulnerability assessment training to meet the requirements of emergency responders. J. Homel. Secur. Emerg. Manag. 10(1), 319–332 (2013) Turner, A., Glantz, K., Gall, J.: A practitioner-researcher partnership to develop and deliver operational value of threat, risk and vulnerability assessment training to meet the requirements of emergency responders. J. Homel. Secur. Emerg. Manag. 10(1), 319–332 (2013)
217.
Zurück zum Zitat Moalla, R., Labiod, H., Lonc, B., Simoni, N.: Risk analysis study of its communication architecture. In: 2012 Third International Conference on the Network of the Future (NOF), pp. 1–5. IEEE (2012) Moalla, R., Labiod, H., Lonc, B., Simoni, N.: Risk analysis study of its communication architecture. In: 2012 Third International Conference on the Network of the Future (NOF), pp. 1–5. IEEE (2012)
218.
Zurück zum Zitat Alberts, C.J., Behrens, S.G., Pethia, R.D., Wilson, W.R.: Operationally critical threat, asset, and vulnerability evaluation (octave) framework, version 1.0. Technical report, Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst (1999) Alberts, C.J., Behrens, S.G., Pethia, R.D., Wilson, W.R.: Operationally critical threat, asset, and vulnerability evaluation (octave) framework, version 1.0. Technical report, Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst (1999)
219.
Zurück zum Zitat Zahra, B.F., Abdelhamid, B.: Risk analysis in internet of things using EBIOS. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–7. IEEE (2017) Zahra, B.F., Abdelhamid, B.: Risk analysis in internet of things using EBIOS. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–7. IEEE (2017)
220.
Zurück zum Zitat Méthode Harmonisée d’Analyse de Risques. Mehari. CLUSIF, France (2007) Méthode Harmonisée d’Analyse de Risques. Mehari. CLUSIF, France (2007)
221.
Zurück zum Zitat Barber, B., Davey, J.: The use of the CCTA risk analysis and management methodology Cramm in health information systems. Medinfo 92, 1589–1593 (1992) Barber, B., Davey, J.: The use of the CCTA risk analysis and management methodology Cramm in health information systems. Medinfo 92, 1589–1593 (1992)
222.
Zurück zum Zitat Secrétariat Général Défense Nationale. Ebios-expression des besoins et identification des objectifs de sécurité (2004) Secrétariat Général Défense Nationale. Ebios-expression des besoins et identification des objectifs de sécurité (2004)
223.
Zurück zum Zitat Süzen, A.A.: A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem. Int. J. Comput. Netw. Inf. Secur. 12(1) (2020) Süzen, A.A.: A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem. Int. J. Comput. Netw. Inf. Secur. 12(1) (2020)
224.
Zurück zum Zitat Brandstötter, M., Komenda, T., Ranz, F., Wedenig, P., Gattringer, H., Kaiser, L., Breitenhuber, G., Schlotzhauer, A., Müller, A., Hofbaur, M.: Versatile collaborative robot applications through safety-rated modification limits. In: International Conference on Robotics in Alpe-Adria Danube Region, pp. 438–446. Springer (2019) Brandstötter, M., Komenda, T., Ranz, F., Wedenig, P., Gattringer, H., Kaiser, L., Breitenhuber, G., Schlotzhauer, A., Müller, A., Hofbaur, M.: Versatile collaborative robot applications through safety-rated modification limits. In: International Conference on Robotics in Alpe-Adria Danube Region, pp. 438–446. Springer (2019)
225.
Zurück zum Zitat Komenda, T., Steiner, M., Rathmair, M., Brandstötter, M.: Introducing a morphological box for an extended risk assessment of human-robot work systems considering prospective system modifications. Gra, In: Joint Austrian Computer Vision and Robotics WorkshopAt (2019) Komenda, T., Steiner, M., Rathmair, M., Brandstötter, M.: Introducing a morphological box for an extended risk assessment of human-robot work systems considering prospective system modifications. Gra, In: Joint Austrian Computer Vision and Robotics WorkshopAt (2019)
226.
Zurück zum Zitat Chemweno, P., Pintelon, L., Decre, W.: Orienting safety assurance with outcomes of hazard analysis and risk assessment: a review of the ISO 15066 standard for collaborative robot systems. Saf. Sci. 129, 104832 (2020) Chemweno, P., Pintelon, L., Decre, W.: Orienting safety assurance with outcomes of hazard analysis and risk assessment: a review of the ISO 15066 standard for collaborative robot systems. Saf. Sci. 129, 104832 (2020)
227.
Zurück zum Zitat Wan, N., Li, L., Ye, C., Wang, B.: Risk assessment in intelligent manufacturing process: a case study of an optical cable automatic arranging robot. IEEE Access 7, 105892–105901 (2019) Wan, N., Li, L., Ye, C., Wang, B.: Risk assessment in intelligent manufacturing process: a case study of an optical cable automatic arranging robot. IEEE Access 7, 105892–105901 (2019)
228.
Zurück zum Zitat George, G., Thampi, S.M.: Vulnerability-based risk assessment and mitigation strategies for edge devices in the internet of things. Pervasive Mob. Comput. 59, 101068 (2019) George, G., Thampi, S.M.: Vulnerability-based risk assessment and mitigation strategies for edge devices in the internet of things. Pervasive Mob. Comput. 59, 101068 (2019)
229.
Zurück zum Zitat Huang, Y.-L., Sun, W.-L., Tang, Y.-H.: 3aram: a 3-layer AHP-based risk assessment model and its implementation for an industrial IoT cloud. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 450–457. IEEE (2019) Huang, Y.-L., Sun, W.-L., Tang, Y.-H.: 3aram: a 3-layer AHP-based risk assessment model and its implementation for an industrial IoT cloud. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 450–457. IEEE (2019)
230.
Zurück zum Zitat Radanliev, P., De Roure, D.C., Nurse, J.R.C., Montalvo, R.M., Cannady, S., Santos, O., Burnap, P., Maple, C., et al.: Future developments in standardisation of cyber risk in the internet of things (iot). SN Appl. Sci. 2(2), 169 (2020) Radanliev, P., De Roure, D.C., Nurse, J.R.C., Montalvo, R.M., Cannady, S., Santos, O., Burnap, P., Maple, C., et al.: Future developments in standardisation of cyber risk in the internet of things (iot). SN Appl. Sci. 2(2), 169 (2020)
231.
Zurück zum Zitat Lv, Z., Yang, H., Singh, A.K., Manogaran, G., Lv, H.: Trustworthiness in industrial IoT systems based on artificial intelligence. IEEE Trans. Ind. Inform. (2020) Lv, Z., Yang, H., Singh, A.K., Manogaran, G., Lv, H.: Trustworthiness in industrial IoT systems based on artificial intelligence. IEEE Trans. Ind. Inform. (2020)
232.
Zurück zum Zitat Afzaliseresht, N., Miao, Y., Michalska, S., Liu, Q., Wang, H.: From logs to stories: human-centred data mining for cyber threat intelligence. IEEE Access 8, 19089–19099 (2020) Afzaliseresht, N., Miao, Y., Michalska, S., Liu, Q., Wang, H.: From logs to stories: human-centred data mining for cyber threat intelligence. IEEE Access 8, 19089–19099 (2020)
233.
Zurück zum Zitat Koloveas, P., Chantzios, T., Tryfonopoulos, C., Skiadopoulos, S.: A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence. In: 2019 IEEE World Congress on Services (SERVICES), vol. 2642, pp. 3–8. IEEE (2019) Koloveas, P., Chantzios, T., Tryfonopoulos, C., Skiadopoulos, S.: A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence. In: 2019 IEEE World Congress on Services (SERVICES), vol. 2642, pp. 3–8. IEEE (2019)
234.
Zurück zum Zitat Xu, Z., Parizi, R.M., Hammoudeh, M., Loyola-González, O.: Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), vol. 2, 1147. Springer (2020) Xu, Z., Parizi, R.M., Hammoudeh, M., Loyola-González, O.: Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), vol. 2, 1147. Springer (2020)
235.
Zurück zum Zitat Gupta, S., Sabitha, A.S., Punhani, R.: Cyber security threat intelligence using data mining techniques and artificial intelligence. Int. J. Recent Technol. Eng. 8, 6133–6140 (2019) Gupta, S., Sabitha, A.S., Punhani, R.: Cyber security threat intelligence using data mining techniques and artificial intelligence. Int. J. Recent Technol. Eng. 8, 6133–6140 (2019)
236.
Zurück zum Zitat De Cubber, G., Doroftei, D., Rudin, K., Berns, K., Matos, A., Serrano, D., Sanchez, J., Govindaraj, S., Bedkowski, J., Roda, R., et al.: Introduction to the use of robotic tools for search and rescue (2017) De Cubber, G., Doroftei, D., Rudin, K., Berns, K., Matos, A., Serrano, D., Sanchez, J., Govindaraj, S., Bedkowski, J., Roda, R., et al.: Introduction to the use of robotic tools for search and rescue (2017)
237.
Zurück zum Zitat Davahlia, A., Shamsib, M., Abaeic, G.: A lightweight anomaly detection model using SVM for WSNs in IoT through a hybrid feature selection algorithm based on GA and GWO. J. Comput. Secur. 7(1), 63–79 (2020) Davahlia, A., Shamsib, M., Abaeic, G.: A lightweight anomaly detection model using SVM for WSNs in IoT through a hybrid feature selection algorithm based on GA and GWO. J. Comput. Secur. 7(1), 63–79 (2020)
238.
Zurück zum Zitat Pham, V., Seo, E., Chung, T.-M.: Lightweight convolutional neural network based intrusion detection system. J. Commun. 15(11) (2020) Pham, V., Seo, E., Chung, T.-M.: Lightweight convolutional neural network based intrusion detection system. J. Commun. 15(11) (2020)
239.
Zurück zum Zitat He, H., Gray, J., Cangelosi, A., Meng, Q., McGinnity, T.M., Mehnen, J.: The challenges and opportunities of artificial intelligence in implementing trustworthy robotics and autonomous systems. In: 3rd International Conference on Intelligent Robotic and Control Engineering (2020) He, H., Gray, J., Cangelosi, A., Meng, Q., McGinnity, T.M., Mehnen, J.: The challenges and opportunities of artificial intelligence in implementing trustworthy robotics and autonomous systems. In: 3rd International Conference on Intelligent Robotic and Control Engineering (2020)
240.
Zurück zum Zitat Soe, Y.N., Feng, Y., Santosa, P.I., Hartanto, R., Sakurai, K.: Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electronics 9(1), 144 (2020) Soe, Y.N., Feng, Y., Santosa, P.I., Hartanto, R., Sakurai, K.: Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electronics 9(1), 144 (2020)
241.
Zurück zum Zitat Sethumadhavan, S., Waksman, A., Suozzo, M., Huang, Y., Eum, J.: Trustworthy hardware from untrusted components. Commun. ACM 58(9), 60–71 (2015) Sethumadhavan, S., Waksman, A., Suozzo, M., Huang, Y., Eum, J.: Trustworthy hardware from untrusted components. Commun. ACM 58(9), 60–71 (2015)
242.
Zurück zum Zitat Huffmire, T., Brotherton, B., Wang, G., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., Irvine, C.: Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems. In: 2007 IEEE Symposium on Security and Privacy (SP), pp. 281–295. IEEE (2007) Huffmire, T., Brotherton, B., Wang, G., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., Irvine, C.: Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems. In: 2007 IEEE Symposium on Security and Privacy (SP), pp. 281–295. IEEE (2007)
243.
Zurück zum Zitat Waksman, A., Sethumadhavan, S.: Tamper evident microprocessors. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 173–188. IEEE (2010) Waksman, A., Sethumadhavan, S.: Tamper evident microprocessors. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 173–188. IEEE (2010)
244.
Zurück zum Zitat Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using ic fingerprinting. In: IEEE Symposium on Security and Privacy, 2007. SP’07, pp. 296–310. IEEE (2007) Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using ic fingerprinting. In: IEEE Symposium on Security and Privacy, 2007. SP’07, pp. 296–310. IEEE (2007)
245.
Zurück zum Zitat Pike, L., Hickey, P., Elliott, T., Mertens, E., Tomb, A.: Trackos: a security-aware real-time operating system. In: International Conference on Runtime Verification, pp. 302–317. Springer (2016) Pike, L., Hickey, P., Elliott, T., Mertens, E., Tomb, A.: Trackos: a security-aware real-time operating system. In: International Conference on Runtime Verification, pp. 302–317. Springer (2016)
246.
Zurück zum Zitat Abera, T., Asokan, N., Davi, L., Ekberg, J.-E., Nyman, T., Paverd, A., Sadeghi, A.-R., Tsudik, G.: C-flat: control-flow attestation for embedded systems software. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 743–754. ACM (2016) Abera, T., Asokan, N., Davi, L., Ekberg, J.-E., Nyman, T., Paverd, A., Sadeghi, A.-R., Tsudik, G.: C-flat: control-flow attestation for embedded systems software. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 743–754. ACM (2016)
247.
Zurück zum Zitat Wang, H., Zhang, C., Song, Y., Pang, B.: Robot arm perceptive exploration based significant slam in search and rescue environment. Int. J. Robot. Autom. 33(4) (2018) Wang, H., Zhang, C., Song, Y., Pang, B.: Robot arm perceptive exploration based significant slam in search and rescue environment. Int. J. Robot. Autom. 33(4) (2018)
248.
Zurück zum Zitat Romero, M., Frey, B., Southern, C., Abowd, G.D.: Brailletouch: designing a mobile eyes-free soft keyboard. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 707–709. ACM (2011) Romero, M., Frey, B., Southern, C., Abowd, G.D.: Brailletouch: designing a mobile eyes-free soft keyboard. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 707–709. ACM (2011)
249.
Zurück zum Zitat Joint Task Force Transformation Initiative et al.: Guide for conducting risk assessments. Special Publication (NIST SP)-800-30 Rev 1 (2012) Joint Task Force Transformation Initiative et al.: Guide for conducting risk assessments. Special Publication (NIST SP)-800-30 Rev 1 (2012)
250.
Zurück zum Zitat Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., Halgand, Y.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 139, 156–178 (2015) Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., Halgand, Y.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 139, 156–178 (2015)
251.
Zurück zum Zitat McLean, I., Szymanski, B., Bivens, A.: Methodology of risk assessment in mobile agent system design. In: Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 35–42. IEEE (2003) McLean, I., Szymanski, B., Bivens, A.: Methodology of risk assessment in mobile agent system design. In: Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 35–42. IEEE (2003)
252.
Zurück zum Zitat Guiochet, J., Martin-Guillerez, D., Powell, D.: Experience with model-based user-centered risk assessment for service robots. In: 2010 IEEE 12th International Symposium on High-Assurance Systems Engineering (HASE), pp. 104–113. IEEE (2010) Guiochet, J., Martin-Guillerez, D., Powell, D.: Experience with model-based user-centered risk assessment for service robots. In: 2010 IEEE 12th International Symposium on High-Assurance Systems Engineering (HASE), pp. 104–113. IEEE (2010)
253.
Zurück zum Zitat Wagner, H.J., Alvarez, M., Kyjanek, O., Bhiri, Z., Buck, M., Menges, A.: Flexible and transportable robotic timber construction platform-tim. Autom. Constr. 120, 103400 (2020) Wagner, H.J., Alvarez, M., Kyjanek, O., Bhiri, Z., Buck, M., Menges, A.: Flexible and transportable robotic timber construction platform-tim. Autom. Constr. 120, 103400 (2020)
254.
Zurück zum Zitat Diab, M., Pomarlan, M., Beßler, D., Akbari, A., Rosell, J., Bateman, J., Beetz, M.: Skillman-a skill-based robotic manipulation framework based on perception and reasoning. Robot. Auton. Syst. 134, 103653 (2020) Diab, M., Pomarlan, M., Beßler, D., Akbari, A., Rosell, J., Bateman, J., Beetz, M.: Skillman-a skill-based robotic manipulation framework based on perception and reasoning. Robot. Auton. Syst. 134, 103653 (2020)
255.
Zurück zum Zitat Choi, H., Kate, S., Aafer, Y., Zhang, X., Xu, D.: Software-based realtime recovery from sensor attacks on robotic vehicles. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses ( RAID 2020), pp. 349–364 (2020) Choi, H., Kate, S., Aafer, Y., Zhang, X., Xu, D.: Software-based realtime recovery from sensor attacks on robotic vehicles. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses ( RAID 2020), pp. 349–364 (2020)
256.
Zurück zum Zitat Beaudoin, L., Avanthey, L., Villard, C.: Porting ardupilot to esp32: towards a universal open-source architecture for agile and easily replicable multi-domains mapping robots. Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 43, 933–939 (2020) Beaudoin, L., Avanthey, L., Villard, C.: Porting ardupilot to esp32: towards a universal open-source architecture for agile and easily replicable multi-domains mapping robots. Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 43, 933–939 (2020)
257.
Zurück zum Zitat Huang, Y., Wang, W., Wang, Y., Jiang, T., Zhang, Q.: Lightweight sybil-resilient multi-robot networks by multipath manipulation. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 2185–2193. IEEE (2020) Huang, Y., Wang, W., Wang, Y., Jiang, T., Zhang, Q.: Lightweight sybil-resilient multi-robot networks by multipath manipulation. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 2185–2193. IEEE (2020)
258.
Zurück zum Zitat Wallhoff, F.: Fgnet-facial expression and emotion database. Technische Universität München (2004) Wallhoff, F.: Fgnet-facial expression and emotion database. Technische Universität München (2004)
259.
Zurück zum Zitat Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31(2), 26–34 (1998) Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31(2), 26–34 (1998)
260.
Zurück zum Zitat Douglas, M., Bailey, K., Leeney, M., Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimed. Tools Appl. 77(13), 17333–17373 (2018) Douglas, M., Bailey, K., Leeney, M., Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimed. Tools Appl. 77(13), 17333–17373 (2018)
261.
Zurück zum Zitat Woodward, J.D., Jr., Horn, C., Gatune, J., Thomas, A.: Biometrics: a look at facial recognition. Technical report, Rand Corp Santa Monica, CA (2003) Woodward, J.D., Jr., Horn, C., Gatune, J., Thomas, A.: Biometrics: a look at facial recognition. Technical report, Rand Corp Santa Monica, CA (2003)
262.
Zurück zum Zitat Taupin, J.M.: Using forensic DNA evidence at trial: a case study approach. CRC Press, Boca Raton (2016) Taupin, J.M.: Using forensic DNA evidence at trial: a case study approach. CRC Press, Boca Raton (2016)
263.
Zurück zum Zitat Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004) Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
264.
Zurück zum Zitat George, J.P.: Development of efficient biometric recognition algorithms based on fingerprint and face. Ph.D. thesis, Christ University (2012) George, J.P.: Development of efficient biometric recognition algorithms based on fingerprint and face. Ph.D. thesis, Christ University (2012)
265.
Zurück zum Zitat Al-Ani, M.S., Rajab, M.A.: Biometrics hand geometry using discrete cosine transform (DCT). Sci. Technol. 3(4), 112–117 (2013) Al-Ani, M.S., Rajab, M.A.: Biometrics hand geometry using discrete cosine transform (DCT). Sci. Technol. 3(4), 112–117 (2013)
266.
Zurück zum Zitat Jain, A.K., Kumar, A.: Biometric recognition: an overview. In: Second Generation Biometrics: The Ethical, Legal and Social Context, pp. 49–79. Springer (2012) Jain, A.K., Kumar, A.: Biometric recognition: an overview. In: Second Generation Biometrics: The Ethical, Legal and Social Context, pp. 49–79. Springer (2012)
267.
Zurück zum Zitat Wei, X., Wang, T., Tang, C., Fan, J.: Collaborative mobile jammer tracking in multi-hop wireless network. Future Gener. Comput. Syst. 78, 1027–1039 (2018) Wei, X., Wang, T., Tang, C., Fan, J.: Collaborative mobile jammer tracking in multi-hop wireless network. Future Gener. Comput. Syst. 78, 1027–1039 (2018)
268.
Zurück zum Zitat Nguyen, M.-H.: The relationship between password-authenticated key exchange and other cryptographic primitives. In: Theory of Cryptography Conference, pp. 457–475. Springer (2005) Nguyen, M.-H.: The relationship between password-authenticated key exchange and other cryptographic primitives. In: Theory of Cryptography Conference, pp. 457–475. Springer (2005)
269.
Zurück zum Zitat Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981) MathSciNet Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981) MathSciNet
270.
Zurück zum Zitat Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32(5–6), 321–325 (2010) Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32(5–6), 321–325 (2010)
271.
Zurück zum Zitat Chaudhry, S.A., Farash, M.S., Naqvi, H., Sher, M.: A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 16(1), 113–139 (2016) Chaudhry, S.A., Farash, M.S., Naqvi, H., Sher, M.: A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 16(1), 113–139 (2016)
272.
Zurück zum Zitat He, D., Gao, Y., Chan, S., Chen, C., Jiajun, B.: An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 10(4), 361–371 (2010) He, D., Gao, Y., Chan, S., Chen, C., Jiajun, B.: An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 10(4), 361–371 (2010)
273.
Zurück zum Zitat Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., Wei, H.-W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011) Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., Wei, H.-W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767–4779 (2011)
274.
Zurück zum Zitat Chen, T.-H., Shih, W.-K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010) Chen, T.-H., Shih, W.-K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704–712 (2010)
275.
Zurück zum Zitat Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443–6462 (2014) Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443–6462 (2014)
276.
Zurück zum Zitat Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36(1), 316–323 (2013) Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36(1), 316–323 (2013)
277.
Zurück zum Zitat Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. (2018) Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. (2018)
278.
Zurück zum Zitat Li, C.-T., Weng, C.-Y., Lee, C.-C.: An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8), 9589–9603 (2013) Li, C.-T., Weng, C.-Y., Lee, C.-C.: An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8), 9589–9603 (2013)
279.
Zurück zum Zitat Gope, P., Hwang, T., et al.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016) Gope, P., Hwang, T., et al.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016)
280.
Zurück zum Zitat Jiang, Q., Ma, J., Xiang, L., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Netw. Appl. 8(6), 1070–1081 (2015) Jiang, Q., Ma, J., Xiang, L., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Netw. Appl. 8(6), 1070–1081 (2015)
281.
Zurück zum Zitat Fan, W., Lili, X., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl. 10(1), 16–30 (2017) Fan, W., Lili, X., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl. 10(1), 16–30 (2017)
282.
Zurück zum Zitat Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58–80 (2016) Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58–80 (2016)
283.
Zurück zum Zitat Srinivas, J., Mukhopadhyay, S., Mishra, D.: Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Netw. 54, 147–169 (2017) Srinivas, J., Mukhopadhyay, S., Mishra, D.: Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Netw. 54, 147–169 (2017)
284.
Zurück zum Zitat González Muñiz, M., Laud, P.: On the (im) possibility of perennial message recognition protocols without public-key cryptography. In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 1510–1515. ACM (2011) González Muñiz, M., Laud, P.: On the (im) possibility of perennial message recognition protocols without public-key cryptography. In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 1510–1515. ACM (2011)
285.
Zurück zum Zitat Kumar, P., Choudhury, A.J., Sain, M., Lee, S.-G., Lee, H.-J.: Ruasn: a robust user authentication framework for wireless sensor networks. Sensors 11(5), 5020–5046 (2011) Kumar, P., Choudhury, A.J., Sain, M., Lee, S.-G., Lee, H.-J.: Ruasn: a robust user authentication framework for wireless sensor networks. Sensors 11(5), 5020–5046 (2011)
286.
Zurück zum Zitat Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 6, 522–533 (2007) Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 6, 522–533 (2007)
287.
Zurück zum Zitat De Canniere, C., Dunkelman, O., Knežević, M.: Katan and ktantan—a family of small and efficient hardware-oriented block ciphers. In: Cryptographic Hardware and Embedded Systems-CHES 2009, pp. 272–288. Springer (2009) De Canniere, C., Dunkelman, O., Knežević, M.: Katan and ktantan—a family of small and efficient hardware-oriented block ciphers. In: Cryptographic Hardware and Embedded Systems-CHES 2009, pp. 272–288. Springer (2009)
288.
Zurück zum Zitat Gong, Z., Nikova, S., Law, Y.W.: Klein: a new family of lightweight block ciphers. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues, pp. 1–18. Springer (2011) Gong, Z., Nikova, S., Law, Y.W.: Klein: a new family of lightweight block ciphers. In: International Workshop on Radio Frequency Identification: Security and Privacy Issues, pp. 1–18. Springer (2011)
289.
Zurück zum Zitat Lim, C.H., Korkishko, T.: mcrypton—a lightweight block cipher for security of low-cost rfid tags and sensors. In: International Workshop on Information Security Applications, pp. 243–258. Springer (2005) Lim, C.H., Korkishko, T.: mcrypton—a lightweight block cipher for security of low-cost rfid tags and sensors. In: International Workshop on Information Security Applications, pp. 243–258. Springer (2005)
290.
Zurück zum Zitat Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 342–357. Springer (2011) Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 342–357. Springer (2011)
291.
Zurück zum Zitat Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: an ultra-lightweight block cipher. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 450–466. Springer (2007) Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: an ultra-lightweight block cipher. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 450–466. Springer (2007)
292.
Zurück zum Zitat Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: A lightweight block cipher for multiple platforms. In: International Conference on Selected Areas in Cryptography, pp. 339–354. Springer (2012) Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: A lightweight block cipher for multiple platforms. In: International Conference on Selected Areas in Cryptography, pp. 339–354. Springer (2012)
293.
Zurück zum Zitat Yap, H., Khoo, K., Poschmann, A., Henricksen, M.: Epcbc-a block cipher suitable for electronic product code encryption. In: International Conference on Cryptology and Network Security, pp. 76–97. Springer (2011) Yap, H., Khoo, K., Poschmann, A., Henricksen, M.: Epcbc-a block cipher suitable for electronic product code encryption. In: International Conference on Cryptology and Network Security, pp. 76–97. Springer (2011)
294.
Zurück zum Zitat Dworkin, M.: Recommendation for block cipher modes of operation. Methods and techniques. Technical report, National Inst of Standards and Technology, Gaithersburg, MD, Computer Security Div (2001) Dworkin, M.: Recommendation for block cipher modes of operation. Methods and techniques. Technical report, National Inst of Standards and Technology, Gaithersburg, MD, Computer Security Div (2001)
295.
Zurück zum Zitat Breiling, B., Dieber, B., Schartner, P.: Secure communication for the robot operating system. In: 2017 Annual IEEE International Systems Conference (SysCon), pp. 1–6. IEEE (2017) Breiling, B., Dieber, B., Schartner, P.: Secure communication for the robot operating system. In: 2017 Annual IEEE International Systems Conference (SysCon), pp. 1–6. IEEE (2017)
296.
Zurück zum Zitat Hussein, A., Elhajj, I.H., Chehab, A., Kayssi, A.: Securing diameter: comparing tls, dtls, and ipsec. In: 2016 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), pp. 1–8. IEEE (2016) Hussein, A., Elhajj, I.H., Chehab, A., Kayssi, A.: Securing diameter: comparing tls, dtls, and ipsec. In: 2016 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET), pp. 1–8. IEEE (2016)
297.
Zurück zum Zitat Dieber, B., Kacianka, S., Rass, S., Schartner, P.: Application-level security for ros-based applications. In: 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 4477–4482. IEEE (2016) Dieber, B., Kacianka, S., Rass, S., Schartner, P.: Application-level security for ros-based applications. In: 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 4477–4482. IEEE (2016)
298.
Zurück zum Zitat Hussaini, S.: Cyber security in cloud using blowfish encryption. Int. J. Inf. Technol. (IJIT), 6(5) (2020) Hussaini, S.: Cyber security in cloud using blowfish encryption. Int. J. Inf. Technol. (IJIT), 6(5) (2020)
299.
Zurück zum Zitat Tian, N.: Cloud-edge hybrid robotic systems for physical human robot interactions. Ph.D. thesis, UC Berkeley (2020) Tian, N.: Cloud-edge hybrid robotic systems for physical human robot interactions. Ph.D. thesis, UC Berkeley (2020)
300.
Zurück zum Zitat Chavhan, S., Doriya, R.: Secured map building using elliptic curve integrated encryption scheme and kerberos for cloud-based robots. In: 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), pp. 157–164. IEEE (2020) Chavhan, S., Doriya, R.: Secured map building using elliptic curve integrated encryption scheme and kerberos for cloud-based robots. In: 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), pp. 157–164. IEEE (2020)
301.
Zurück zum Zitat Strobel, V., Ferrer, E.C., Dorigo, M.: Blockchain technology secures robot swarms: a comparison of consensus protocols and their resilience to byzantine robots. Front. Robot. AI 7, 54 (2020) Strobel, V., Ferrer, E.C., Dorigo, M.: Blockchain technology secures robot swarms: a comparison of consensus protocols and their resilience to byzantine robots. Front. Robot. AI 7, 54 (2020)
302.
Zurück zum Zitat Alcaraz, C., Rubio, J.E., Lopez, J.: Blockchain-assisted access for federated smart grid domains: coupling and features. J. Parallel Distrib. Comput. (2020) Alcaraz, C., Rubio, J.E., Lopez, J.: Blockchain-assisted access for federated smart grid domains: coupling and features. J. Parallel Distrib. Comput. (2020)
303.
Zurück zum Zitat Fagiolini, A., Pellinacci, M., Valenti, G., Dini, G., Bicchi, A.: Consensus-based distributed intrusion detection for multi-robot systems. In: IEEE International Conference on Robotics and Automation, 2008. ICRA 2008, pp. 120–127. IEEE (2008) Fagiolini, A., Pellinacci, M., Valenti, G., Dini, G., Bicchi, A.: Consensus-based distributed intrusion detection for multi-robot systems. In: IEEE International Conference on Robotics and Automation, 2008. ICRA 2008, pp. 120–127. IEEE (2008)
304.
Zurück zum Zitat Reategui, E.B., Campbell, J.: A classification system for credit card transactions. In: European Workshop on Advances in Case-Based Reasoning, pp. 280–291. Springer (1994) Reategui, E.B., Campbell, J.: A classification system for credit card transactions. In: European Workshop on Advances in Case-Based Reasoning, pp. 280–291. Springer (1994)
305.
Zurück zum Zitat Bonifacio, J.M., Cansian, A.M., De Carvalho, A.C.P.L.F., Moreira, E.S.: Neural networks applied in intrusion detection systems. In: The 1998 IEEE International Joint Conference on Neural Networks Proceedings, 1998. IEEE World Congress on Computational Intelligence, vol. 1, pp. 205–210. IEEE (1998) Bonifacio, J.M., Cansian, A.M., De Carvalho, A.C.P.L.F., Moreira, E.S.: Neural networks applied in intrusion detection systems. In: The 1998 IEEE International Joint Conference on Neural Networks Proceedings, 1998. IEEE World Congress on Computational Intelligence, vol. 1, pp. 205–210. IEEE (1998)
306.
Zurück zum Zitat Yeung, D.-Y., Chow, C.: Parzen-window network intrusion detectors. In: Object Recognition Supported by User Interaction for Service Robots, vol. 4, pp. 385–388. IEEE (2002) Yeung, D.-Y., Chow, C.: Parzen-window network intrusion detectors. In: Object Recognition Supported by User Interaction for Service Robots, vol. 4, pp. 385–388. IEEE (2002)
307.
Zurück zum Zitat Vigna, G., Robertson, W., Kher, V., Kemmerer, R.A.: A stateful intrusion detection system for world-wide web servers. In: Null, p. 34. IEEE (2003) Vigna, G., Robertson, W., Kher, V., Kemmerer, R.A.: A stateful intrusion detection system for world-wide web servers. In: Null, p. 34. IEEE (2003)
308.
Zurück zum Zitat Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking And Communications, 2005.(WiMob’2005), vol. 3, pp. 253–259. IEEE (2005) Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking And Communications, 2005.(WiMob’2005), vol. 3, pp. 253–259. IEEE (2005)
309.
Zurück zum Zitat Gudadhe, M., Prasad, P., Wankhade, L.K.: A new data mining based network intrusion detection model. In: 2010 International Conference on Computer and Communication Technology (ICCCT), pp. 731–735. IEEE (2010) Gudadhe, M., Prasad, P., Wankhade, L.K.: A new data mining based network intrusion detection model. In: 2010 International Conference on Computer and Communication Technology (ICCCT), pp. 731–735. IEEE (2010)
310.
Zurück zum Zitat Om, H., Kundu, A.: A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In: 2012 1st International Conference on Recent Advances in Information Technology (RAIT), pp. 131–136. IEEE (2012) Om, H., Kundu, A.: A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In: 2012 1st International Conference on Recent Advances in Information Technology (RAIT), pp. 131–136. IEEE (2012)
311.
Zurück zum Zitat Rath, M., Pattanayak, B.K.: Security protocol with ids framework using mobile agent in robotic manet. Int. J. Inf. Secur. Privacy (IJISP) 13(1), 46–58 (2019) Rath, M., Pattanayak, B.K.: Security protocol with ids framework using mobile agent in robotic manet. Int. J. Inf. Secur. Privacy (IJISP) 13(1), 46–58 (2019)
312.
Zurück zum Zitat Rivera, S., Iannillo, A.K., et al.: Ros-immunity: integrated approach for the security of ros-enabled robotic systems (2020) Rivera, S., Iannillo, A.K., et al.: Ros-immunity: integrated approach for the security of ros-enabled robotic systems (2020)
313.
Zurück zum Zitat Zhou, Y., Mazzuchi, T.A., Sarkani, S.: M-adaboost-a based ensemble system for network intrusion detection. Expert Syst. Appl. 162 (2020) Zhou, Y., Mazzuchi, T.A., Sarkani, S.: M-adaboost-a based ensemble system for network intrusion detection. Expert Syst. Appl. 162 (2020)
314.
Zurück zum Zitat Gorbenko, A., Popov, V.: Abnormal behavioral pattern detection in closed-loop robotic systems for zero-day deceptive threats. In: 2020 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), pp. 1–6. IEEE (2020) Gorbenko, A., Popov, V.: Abnormal behavioral pattern detection in closed-loop robotic systems for zero-day deceptive threats. In: 2020 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), pp. 1–6. IEEE (2020)
315.
Zurück zum Zitat Almalawi, A., Fahad, A., Tari, Z., Khan, A.I., Alzahrani, N., Bakhsh, S.T., Alassafi, M.O., Alshdadi, A., Qaiyum, S.: Add-on anomaly threshold technique for improving unsupervised intrusion detection on scada data. Electronics 9(6), 1017 (2020) Almalawi, A., Fahad, A., Tari, Z., Khan, A.I., Alzahrani, N., Bakhsh, S.T., Alassafi, M.O., Alshdadi, A., Qaiyum, S.: Add-on anomaly threshold technique for improving unsupervised intrusion detection on scada data. Electronics 9(6), 1017 (2020)
316.
Zurück zum Zitat Spitzner, L.: Honeypots: Tracking Hackers, vol. 1. Addison-Wesley, Reading (2003) Spitzner, L.: Honeypots: Tracking Hackers, vol. 1. Addison-Wesley, Reading (2003)
317.
Zurück zum Zitat Zhang, F., Zhou, S., Qin, Z., Liu, J.: Honeypot: a supplemented active defense system for network security. In: Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT’2003, pp. 231–235. IEEE (2003) Zhang, F., Zhou, S., Qin, Z., Liu, J.: Honeypot: a supplemented active defense system for network security. In: Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT’2003, pp. 231–235. IEEE (2003)
318.
Zurück zum Zitat Irvene, C., Formby, D., Litchfield, S., Beyah, R.: Honeybot: a honeypot for robotic systems. Proc. IEEE 106(1), 61–70 (2018) Irvene, C., Formby, D., Litchfield, S., Beyah, R.: Honeybot: a honeypot for robotic systems. Proc. IEEE 106(1), 61–70 (2018)
319.
Zurück zum Zitat Ranum, M.: Backofficer friendly (bof) Ranum, M.: Backofficer friendly (bof)
320.
Zurück zum Zitat Spitzner, L.: Specter: a commercial honeypot solution for windows. Acesso em 26(08) (2003) Spitzner, L.: Specter: a commercial honeypot solution for windows. Acesso em 26(08) (2003)
321.
Zurück zum Zitat Provos, N.: Honeyd-a virtual honeypot daemon. In: 10th DFN-CERT Workshop, Hamburg, Germany, vol. 2, p. 4 (2003) Provos, N.: Honeyd-a virtual honeypot daemon. In: 10th DFN-CERT Workshop, Hamburg, Germany, vol. 2, p. 4 (2003)
322.
Zurück zum Zitat La, Q.D., Quek, T.Q.S., Lee, J.: A game theoretic model for enabling honeypots in IoT networks. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2016) La, Q.D., Quek, T.Q.S., Lee, J.: A game theoretic model for enabling honeypots in IoT networks. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2016)
323.
Zurück zum Zitat Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Privacy 99(2), 15–23 (2003) Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Privacy 99(2), 15–23 (2003)
324.
Zurück zum Zitat Terra, A., Riaz, H., Raizer, K., Hata, A., Inam, R.: Safety vs. efficiency: Ai-based risk mitigation in collaborative robotics. In: 2020 6th International Conference on Control, Automation and Robotics (ICCAR), pp. 151–160. IEEE (2020) Terra, A., Riaz, H., Raizer, K., Hata, A., Inam, R.: Safety vs. efficiency: Ai-based risk mitigation in collaborative robotics. In: 2020 6th International Conference on Control, Automation and Robotics (ICCAR), pp. 151–160. IEEE (2020)
325.
Zurück zum Zitat Wang, C., Tok, Y.C., Poolat, R., Chattopadhyay, S., Elara, M.R.: How to secure autonomous mobile robots? an approach with fuzzing, detection and mitigation. J. Syst. Archit. 101838 (2020) Wang, C., Tok, Y.C., Poolat, R., Chattopadhyay, S., Elara, M.R.: How to secure autonomous mobile robots? an approach with fuzzing, detection and mitigation. J. Syst. Archit. 101838 (2020)
326.
Zurück zum Zitat Bykovsky, A.Y.: Heterogeneous network architecture for integration of AI and quantum optics by means of multiple-valued logic. Quantum Rep. 2(1), 126–165 (2020) Bykovsky, A.Y.: Heterogeneous network architecture for integration of AI and quantum optics by means of multiple-valued logic. Quantum Rep. 2(1), 126–165 (2020)
327.
Zurück zum Zitat Alamer, A.: A secure anonymous tracing fog-assisted method for the internet of robotic things. Library Hi Tech (2020) Alamer, A.: A secure anonymous tracing fog-assisted method for the internet of robotic things. Library Hi Tech (2020)
328.
Zurück zum Zitat Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: Cmac, ccm and gcm/gmac: advanced modes of operation of symmetric block ciphers in wireless sensor networks. Inf. Process. Lett. 110(7), 247–251 (2010) MathSciNetMATH Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: Cmac, ccm and gcm/gmac: advanced modes of operation of symmetric block ciphers in wireless sensor networks. Inf. Process. Lett. 110(7), 247–251 (2010) MathSciNetMATH
329.
Zurück zum Zitat Abeykoon, I., Feng, X.: A forensic investigation of the robot operating system. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 851–857. IEEE (2017) Abeykoon, I., Feng, X.: A forensic investigation of the robot operating system. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 851–857. IEEE (2017)
330.
Zurück zum Zitat Erbacher, R.F., Christiansen, K., Sundberg, A., et al.: Visual network forensic techniques and processes. In: 1st Annual Symposium on Information Assurance: Intrusion Detection and Prevention, p. 72 (2006) Erbacher, R.F., Christiansen, K., Sundberg, A., et al.: Visual network forensic techniques and processes. In: 1st Annual Symposium on Information Assurance: Intrusion Detection and Prevention, p. 72 (2006)
331.
Zurück zum Zitat Noura, H.N., Melki, R., Chehab, A., Fernandez, J.H.: Efficient and robust data availability solution for hybrid plc/rf systems. Comput. Netw. 185, 107675 (2021) Noura, H.N., Melki, R., Chehab, A., Fernandez, J.H.: Efficient and robust data availability solution for hybrid plc/rf systems. Comput. Netw. 185, 107675 (2021)
332.
Zurück zum Zitat Chigan, C., Li, L., Ye, Y.: Resource-aware self-adaptive security provisioning in mobile ad hoc networks. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2118–2124. IEEE (2005) Chigan, C., Li, L., Ye, Y.: Resource-aware self-adaptive security provisioning in mobile ad hoc networks. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2118–2124. IEEE (2005)
333.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007. SP’07, pp. 321–334. IEEE (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007. SP’07, pp. 321–334. IEEE (2007)
334.
Zurück zum Zitat Needham, R.M., Wheeler, D.J.: Tea extensions. Report (Cambridge University, Cambridge, UK, 1997) Google Scholar (1997) Needham, R.M., Wheeler, D.J.: Tea extensions. Report (Cambridge University, Cambridge, UK, 1997) Google Scholar (1997)
335.
Zurück zum Zitat Hu, W., Corke, P., Shih, W.C., Overs, L.: secfleck: a public key technology platform for wireless sensor networks. In: European Conference on Wireless Sensor Networks, pp. 296–311. Springer (2009) Hu, W., Corke, P., Shih, W.C., Overs, L.: secfleck: a public key technology platform for wireless sensor networks. In: European Conference on Wireless Sensor Networks, pp. 296–311. Springer (2009)
336.
Zurück zum Zitat Hu, W., Tan, H., Corke, P., Shih, W.C., Jha, S.: Toward trusted wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 7(1), 5 (2010) Hu, W., Tan, H., Corke, P., Shih, W.C., Jha, S.: Toward trusted wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 7(1), 5 (2010)
337.
Zurück zum Zitat Touati, L., Challal, Y., Bouabdallah, A.: C-cp-abe: cooperative ciphertext policy attribute-based encryption for the internet of things. In: 2014 International Conference on Advanced Networking Distributed Systems and Applications (INDS), pp. 64–69. IEEE (2014) Touati, L., Challal, Y., Bouabdallah, A.: C-cp-abe: cooperative ciphertext policy attribute-based encryption for the internet of things. In: 2014 International Conference on Advanced Networking Distributed Systems and Applications (INDS), pp. 64–69. IEEE (2014)
338.
Zurück zum Zitat Touati, L., Challal, Y.: Collaborative kp-abe for cloud-based internet of things applications. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–7. IEEE (2016) Touati, L., Challal, Y.: Collaborative kp-abe for cloud-based internet of things applications. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–7. IEEE (2016)
339.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and communications security, pp. 89–98. ACM (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and communications security, pp. 89–98. ACM (2006)
340.
Zurück zum Zitat Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Theory of Cryptography Conference, pp. 264–282. Springer (2005) Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Theory of Cryptography Conference, pp. 264–282. Springer (2005)
341.
Zurück zum Zitat Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. J. Cryptol. 9(1), 35–67 (1996) MathSciNetMATH Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. J. Cryptol. 9(1), 35–67 (1996) MathSciNetMATH
342.
Zurück zum Zitat Laih, C.-S., Kuo, W.-C.: New signature schemes based on factoring and discrete logarithms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(1), 46–53 (1997) Laih, C.-S., Kuo, W.-C.: New signature schemes based on factoring and discrete logarithms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 80(1), 46–53 (1997)
343.
Zurück zum Zitat Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a Mceliece-based digital signature scheme. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 157–174. Springer (2001) Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a Mceliece-based digital signature scheme. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 157–174. Springer (2001)
344.
345.
Zurück zum Zitat Hoffstein, J., Pipher, J., Silverman, J.H.: Ntru: a ring-based public key cryptosystem. In: International Algorithmic Number Theory Symposium, pp. 267–288. Springer (1998) Hoffstein, J., Pipher, J., Silverman, J.H.: Ntru: a ring-based public key cryptosystem. In: International Algorithmic Number Theory Symposium, pp. 267–288. Springer (1998)
346.
Zurück zum Zitat Noura, H.N., Melki, R., Chehab, A.: Efficient data confidentiality scheme for 5g wireless NOMA communications. J. Inf. Secur. Appl. 58 (2021) Noura, H.N., Melki, R., Chehab, A.: Efficient data confidentiality scheme for 5g wireless NOMA communications. J. Inf. Secur. Appl. 58 (2021)
347.
Zurück zum Zitat Noura, H.N., Melki, R., Kanj, R., Chehab, A.: Secure MIMO d2d communication based on a lightweight and robust PLS cipher scheme. Wirel. Netw. 27(1), 557–574 (2021) Noura, H.N., Melki, R., Kanj, R., Chehab, A.: Secure MIMO d2d communication based on a lightweight and robust PLS cipher scheme. Wirel. Netw. 27(1), 557–574 (2021)
348.
Zurück zum Zitat Trappe, W., Howard, R., Moore, R.S.: Low-energy security: limits and opportunities in the internet of things. IEEE Secur. Privacy 13(1), 14–21 (2015) Trappe, W., Howard, R., Moore, R.S.: Low-energy security: limits and opportunities in the internet of things. IEEE Secur. Privacy 13(1), 14–21 (2015)
349.
Zurück zum Zitat Mukherjee, A.: Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc. IEEE 103(10), 1747–1761 (2015) Mukherjee, A.: Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints. Proc. IEEE 103(10), 1747–1761 (2015)
350.
Zurück zum Zitat Noura, H.N., Melki, R., Chehab, A., Mansour, M.M., Martin, S.: Efficient and secure physical encryption scheme for low-power wireless m2m devices. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1267–1272. IEEE (2018) Noura, H.N., Melki, R., Chehab, A., Mansour, M.M., Martin, S.: Efficient and secure physical encryption scheme for low-power wireless m2m devices. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1267–1272. IEEE (2018)
351.
Zurück zum Zitat Melki, R., Noura, H.N., Mansour, M.M., Chehab, A.: An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things J. 6(1), 361–378 (2018) Melki, R., Noura, H.N., Mansour, M.M., Chehab, A.: An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things J. 6(1), 361–378 (2018)
352.
Zurück zum Zitat Noura, H.N., Melki, R., Chehab, A., Hernandez Fernandez, J.: Efficient and secure message authentication algorithm at the physical layer. Wirel. Netw. 1–15 (2020) Noura, H.N., Melki, R., Chehab, A., Hernandez Fernandez, J.: Efficient and secure message authentication algorithm at the physical layer. Wirel. Netw. 1–15 (2020)
353.
Zurück zum Zitat Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Annual International Cryptology Conference, pp. 1–15. Springer (1996) Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Annual International Cryptology Conference, pp. 1–15. Springer (1996)
354.
Zurück zum Zitat Noura, H.N., Salman, O., Chehab, A., Couturier, R.: Distlog: a distributed logging scheme for IoT forensics. Ad Hoc Netw. 98, 102061 (2020) Noura, H.N., Salman, O., Chehab, A., Couturier, R.: Distlog: a distributed logging scheme for IoT forensics. Ad Hoc Netw. 98, 102061 (2020)
355.
Zurück zum Zitat Melki, R., Noura, H.N., Chehab, A.: Lightweight multi-factor mutual authentication protocol for IoT devices. Int. J. Inf. Secur. 19, 1–16 (2019) Melki, R., Noura, H.N., Chehab, A.: Lightweight multi-factor mutual authentication protocol for IoT devices. Int. J. Inf. Secur. 19, 1–16 (2019)
356.
Zurück zum Zitat Noura, H.N., Melki, R., Chehab, A.: Secure and lightweight mutual multi-factor authentication for IoT communication systems. In: 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), pp. 1–7. IEEE (2019) Noura, H.N., Melki, R., Chehab, A.: Secure and lightweight mutual multi-factor authentication for IoT communication systems. In: 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), pp. 1–7. IEEE (2019)
357.
Zurück zum Zitat Noura, H.N., Salman, O., Couturier, R., Chehab, A.: Novel one round message authentication scheme for constrained IoT devices. J. Ambient Intell. Hum. Comput. 1–17 (2021) Noura, H.N., Salman, O., Couturier, R., Chehab, A.: Novel one round message authentication scheme for constrained IoT devices. J. Ambient Intell. Hum. Comput. 1–17 (2021)
358.
Zurück zum Zitat Noura, H.N., Noura, M., Salman, O., Couturier, R., Chehab, A.: Efficient & secure image availability and content protection. Multimed. Tools Appl. 79, 22869–22904 (2020) Noura, H.N., Noura, M., Salman, O., Couturier, R., Chehab, A.: Efficient & secure image availability and content protection. Multimed. Tools Appl. 79, 22869–22904 (2020)
359.
Zurück zum Zitat Noura, H.N., Chehab, A., Sleem, L., Noura, M., Couturier, R., Mansour, M.M.: One round cipher algorithm for multimedia IoT devices. Multimed. Tools Appl. 77, 1–31 (2018) Noura, H.N., Chehab, A., Sleem, L., Noura, M., Couturier, R., Mansour, M.M.: One round cipher algorithm for multimedia IoT devices. Multimed. Tools Appl. 77, 1–31 (2018)
360.
Zurück zum Zitat Noura, H., Chehab, A., Couturier, R.: Lightweight dynamic key-dependent and flexible cipher scheme for IoT devices. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–8. IEEE (2019) Noura, H., Chehab, A., Couturier, R.: Lightweight dynamic key-dependent and flexible cipher scheme for IoT devices. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–8. IEEE (2019)
361.
Zurück zum Zitat Noura, H.N., Couturier, R., Pham, C., Chehab, A.: Lightweight stream cipher scheme for resource-constrained IoT devices. In: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–8. IEEE (2019) Noura, H.N., Couturier, R., Pham, C., Chehab, A.: Lightweight stream cipher scheme for resource-constrained IoT devices. In: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–8. IEEE (2019)
362.
Zurück zum Zitat Noura, H.N., Chehab, A., Couturier, R.: Overview of efficient symmetric cryptography: dynamic vs static approaches. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–6. IEEE (2020) Noura, H.N., Chehab, A., Couturier, R.: Overview of efficient symmetric cryptography: dynamic vs static approaches. In: 2020 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–6. IEEE (2020)
363.
Zurück zum Zitat Noura, H.N., Melki, R., Malli, M., Chehab, A.: Lightweight and secure cipher scheme for multi-homed systems. Wirel. Netw. 1–18 Noura, H.N., Melki, R., Malli, M., Chehab, A.: Lightweight and secure cipher scheme for multi-homed systems. Wirel. Netw. 1–18
364.
Zurück zum Zitat Noura, H.N., Salman, O., Chehab, A., Couturier, R.: Preserving data security in distributed fog computing. Ad Hoc Netw. 94, 101937 (2019) Noura, H.N., Salman, O., Chehab, A., Couturier, R.: Preserving data security in distributed fog computing. Ad Hoc Netw. 94, 101937 (2019)
365.
Zurück zum Zitat Noura, H.N., Salman, O., Kaaniche, N., Sklavos, N., Chehab, A., Couturier, R.: Tresc: Towards redesigning existing symmetric ciphers. Microprocess. Microsyst. 103478 (2020) Noura, H.N., Salman, O., Kaaniche, N., Sklavos, N., Chehab, A., Couturier, R.: Tresc: Towards redesigning existing symmetric ciphers. Microprocess. Microsyst. 103478 (2020)
366.
Zurück zum Zitat Fawaz, Z., Noura, H.N., Mostefaoui, A.: Securing jpeg-2000 images in constrained environments: a dynamic approach. Multimed. Syst. 24(6), 669–694 (2018) Fawaz, Z., Noura, H.N., Mostefaoui, A.: Securing jpeg-2000 images in constrained environments: a dynamic approach. Multimed. Syst. 24(6), 669–694 (2018)
367.
Zurück zum Zitat Mostefaoui, A., Noura, H.N., Fawaz, Z.: An integrated multimedia data reduction and content confidentiality approach for limited networked devices. Ad Hoc Netw. 32, 81–97 (2015) Mostefaoui, A., Noura, H.N., Fawaz, Z.: An integrated multimedia data reduction and content confidentiality approach for limited networked devices. Ad Hoc Netw. 32, 81–97 (2015)
368.
Zurück zum Zitat Salman, O., Elhajj, I.H., Chehab, A., Kayssi, A.: A multi-level internet traffic classifier using deep learning. In: 2018 9th International Conference on the Network of the Future (NOF), pp. 68–75 (2018) Salman, O., Elhajj, I.H., Chehab, A., Kayssi, A.: A multi-level internet traffic classifier using deep learning. In: 2018 9th International Conference on the Network of the Future (NOF), pp. 68–75 (2018)
369.
Zurück zum Zitat Salman, O., Chaddad, L., Elhajj, I.H., Chehab, A., Kayssi, A.: Pushing intelligence to the network edge. In: 2018 Fifth International Conference on Software Defined Systems (SDS), pp. 87–92 (2018) Salman, O., Chaddad, L., Elhajj, I.H., Chehab, A., Kayssi, A.: Pushing intelligence to the network edge. In: 2018 Fifth International Conference on Software Defined Systems (SDS), pp. 87–92 (2018)
Metadaten
Titel
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
verfasst von
Jean-Paul A. Yaacoub
Hassan N. Noura
Ola Salman
Ali Chehab
Publikationsdatum
19.03.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 1/2022
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-021-00545-8

Weitere Artikel der Ausgabe 1/2022

International Journal of Information Security 1/2022 Zur Ausgabe

Announcement

Track for surveys

Premium Partner