Articles with "vulnerabilities attacks" as a keyword



Photo from wikipedia

Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Network"

DOI: 10.1109/mnet.116.2200034

Abstract: Industrial robots are prototypical cyber-physical systems that are widely deployed in smart and automated manufacturing systems. Industrial robots perform physical operations (picking-and-placing) based on their interactions with other devices in manufacturing systems via the manufacturing… read more here.

Keywords: vulnerabilities attacks; industrial robots; security; robots vulnerabilities ... See more keywords
Photo by andandoporai from unsplash

Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE/ACM Transactions on Networking"

DOI: 10.1109/tnet.2022.3205183

Abstract: IMS (IP Multimedia Subsystem) is an essential 4G/5G component to offer multimedia services. It is used worldwide to support two call services: VoLTE (Voice over LTE) and VoWiFi (Voice over WiFi). In this study, it… read more here.

Keywords: insecurity operational; operational ims; vulnerabilities attacks; ims call ... See more keywords