Security of Critical Infrastructure: Emergence of IoT devices and applications, introduced many new challenges for cybersecurity community. Cyber Science Lab has an extensive research track in IoT/ICS network defense, AI-aided attack detection and analysis in IoT networks and IoT digital investigation.

Bibliometric Analysis on the Rise of Cloud Security
Bibliometric Analysis on the Rise of Cloud Security Abstract: Cloud storage systems are becoming a gold mine for cyber attackers
Read more.
A Bibliometric Analysis of Authentication and Access Control in IoT Devices
A Bibliometric Analysis of Authentication and Access Control in IoT Devices Abstract:   In order to be considered secure, the
Read more.
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform Abstract: The
Read more.
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications Abstract: The proliferation of Internet of Things
Read more.
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats Abstract: One of
Read more.
A hierarchical key pre-distribution scheme for fog networks
A hierarchical key pre-distribution scheme for fog networks Abstract: Security in fog computing is multi‐faceted, and one particular challenge is
Read more.
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure Abstract: Insider attacks
Read more.
CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction
CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction Abstract: Data extraction from files is a prevalent activity
Read more.
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks Abstract: The physical
Read more.