Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (226)

Search Parameters:
Keywords = cybersecurity standard

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 3174 KB  
Review
Threat Landscape and Integrated Cybersecurity Framework for V2V and Autonomous Electric Vehicles
by Kithmini Godewatte Arachchige, Ghanem Alkaabi, Mohsin Murtaza, Qazi Emad Ul Haq, Abedallah Zaid Abualkishik and Cheng-Chi Lee
World Electr. Veh. J. 2025, 16(8), 469; https://doi.org/10.3390/wevj16080469 - 18 Aug 2025
Viewed by 573
Abstract
This study conducts a detailed analysis of cybersecurity threats, including artificial intelligence (AI)-driven cyber-attacks targeting vehicle-to-vehicle (V2V) and electric vehicle (EV) communications within the rapidly evolving field of connected and autonomous vehicles (CAVs). As autonomous and electric vehicles become increasingly integrated into daily [...] Read more.
This study conducts a detailed analysis of cybersecurity threats, including artificial intelligence (AI)-driven cyber-attacks targeting vehicle-to-vehicle (V2V) and electric vehicle (EV) communications within the rapidly evolving field of connected and autonomous vehicles (CAVs). As autonomous and electric vehicles become increasingly integrated into daily life, their susceptibility to cyber threats such as replay, jamming, spoofing, and denial-of-service (DoS) attacks necessitates the development of robust cybersecurity measures. Additionally, EV-specific threats, including battery management system (BMS) exploitation and compromised charging interfaces, introduce distinct vulnerabilities requiring specialized attention. This research proposes a comprehensive and integrated cybersecurity framework that rigorously examines current V2V, vehicle-to-everything (V2X), and EV-specific systems through systematic threat assessments, vulnerability analyses, and the deployment of advanced security controls. Unlike previous state-of-the-art approaches, which primarily focus on isolated threats or specific components such as V2V protocols, the proposed framework provides a holistic cybersecurity strategy addressing the entire communication stack, EV subsystems, and incorporates AI-driven threat detection mechanisms. This comprehensive and integrated approach addresses critical gaps found in the existing literature, making it significantly more adaptable and resilient against evolving cyber-attacks. Our framework aligns with industry standards and regulatory requirements, significantly enhancing the security, safety, and reliability of modern transportation systems. By incorporating specialized cryptographic techniques, secure protocols, and continuous monitoring mechanisms, the proposed approach ensures robust protection against sophisticated cyber threats, thereby safeguarding vehicle operations and user privacy. Full article
Show Figures

Figure 1

21 pages, 1550 KB  
Article
Exploiting Maritime Wi-Fi: Practical Assessment of Onboard Network Vulnerabilities
by Marko Vukšić, Jasmin Ćelić, Ivan Panić and Aleksandar Cuculić
J. Mar. Sci. Eng. 2025, 13(8), 1576; https://doi.org/10.3390/jmse13081576 - 17 Aug 2025
Viewed by 493
Abstract
With the growing integration of digital technologies on modern vessels, ranging from satellite links and mobile networks to onboard Wi-Fi, the exposure of maritime systems to cyber threats has become a pressing concern. Wireless networks on ships, although essential for operations and crew [...] Read more.
With the growing integration of digital technologies on modern vessels, ranging from satellite links and mobile networks to onboard Wi-Fi, the exposure of maritime systems to cyber threats has become a pressing concern. Wireless networks on ships, although essential for operations and crew welfare, often lack sufficient protection and are frequently overlooked in broader cybersecurity strategies. This article explores vulnerabilities linked to Man-in-the-Middle attacks and rogue access points, particularly in port areas where attackers may exploit signal range and proximity. A simulation carried out in a public setting near the Port of Rijeka demonstrated how standard crew devices could be lured into connecting to a counterfeit Wi-Fi network, resulting in traffic interception and potential data leaks. Although practical limitations, such as signal attenuation and distance, reduce the feasibility of such intrusions at sea, the risk remains significant while in port. Insecure configurations and common user behaviors were identified as key enablers. The article outlines a series of countermeasures aligned with international guidelines ranging from segmentation and encryption to crew training and intrusion detection. Addressing these wireless vulnerabilities is essential for building resilience and ensuring that digital transformation efforts in the maritime sector do not come at the expense of security. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

37 pages, 2286 KB  
Article
Parameterised Quantum SVM with Data-Driven Entanglement for Zero-Day Exploit Detection
by Steven Jabulani Nhlapo, Elodie Ngoie Mutombo and Mike Nkongolo Wa Nkongolo
Computers 2025, 14(8), 331; https://doi.org/10.3390/computers14080331 - 15 Aug 2025
Viewed by 489
Abstract
Zero-day attacks pose a persistent threat to computing infrastructure by exploiting previously unknown software vulnerabilities that evade traditional signature-based network intrusion detection systems (NIDSs). To address this limitation, machine learning (ML) techniques offer a promising approach for enhancing anomaly detection in network traffic. [...] Read more.
Zero-day attacks pose a persistent threat to computing infrastructure by exploiting previously unknown software vulnerabilities that evade traditional signature-based network intrusion detection systems (NIDSs). To address this limitation, machine learning (ML) techniques offer a promising approach for enhancing anomaly detection in network traffic. This study evaluates several ML models on a labeled network traffic dataset, with a focus on zero-day attack detection. Ensemble learning methods, particularly eXtreme gradient boosting (XGBoost), achieved perfect classification, identifying all 6231 zero-day instances without false positives and maintaining efficient training and prediction times. While classical support vector machines (SVMs) performed modestly at 64% accuracy, their performance improved to 98% with the use of the borderline synthetic minority oversampling technique (SMOTE) and SMOTE + edited nearest neighbours (SMOTEENN). To explore quantum-enhanced alternatives, a quantum SVM (QSVM) is implemented using three-qubit and four-qubit quantum circuits simulated on the aer_simulator_statevector. The QSVM achieved high accuracy (99.89%) and strong F1-scores (98.95%), indicating that nonlinear quantum feature maps (QFMs) can increase sensitivity to zero-day exploit patterns. Unlike prior work that applies standard quantum kernels, this study introduces a parameterised quantum feature encoding scheme, where each classical feature is mapped using a nonlinear function tuned by a set of learnable parameters. Additionally, a sparse entanglement topology is derived from mutual information between features, ensuring a compact and data-adaptive quantum circuit that aligns with the resource constraints of noisy intermediate-scale quantum (NISQ) devices. Our contribution lies in formalising a quantum circuit design that enables scalable, expressive, and generalisable quantum architectures tailored for zero-day attack detection. This extends beyond conventional usage of QSVMs by offering a principled approach to quantum circuit construction for cybersecurity. While these findings are obtained via noiseless simulation, they provide a theoretical proof of concept for the viability of quantum ML (QML) in network security. Future work should target real quantum hardware execution and adaptive sampling techniques to assess robustness under decoherence, gate errors, and dynamic threat environments. Full article
Show Figures

Figure 1

31 pages, 1321 KB  
Article
A Method for Fault Tolerance of AES Encryption Systems Focused on Improving the Cybersecurity of VANET Through the Use of Residue Codes
by Igor Anatolyevich Kalmykov, Alexandr Anatolyevich Olenev, Daniil Vyacheslavovich Dukhovnyj, Igor Alexandrovich Provornov and Vladimir Sergeyevich Slyadnev
World Electr. Veh. J. 2025, 16(8), 462; https://doi.org/10.3390/wevj16080462 - 13 Aug 2025
Viewed by 225
Abstract
The problem of cybersecurity of vehicular ad hoc network (VANET) is far from being fully solved. This is due to the fact that when exchanging data between On Board Units (OBUs) and Roadside Units (RSUs) a wireless channel is used, which is subject [...] Read more.
The problem of cybersecurity of vehicular ad hoc network (VANET) is far from being fully solved. This is due to the fact that when exchanging data between On Board Units (OBUs) and Roadside Units (RSUs) a wireless channel is used, which is subject to many cyberattacks. It is known that the use of encryption algorithms, particularly Advanced Encryption Standard (AES), can effectively counter many of them. However, during the operation of AES encryption systems, failures may occur, as a result of which closed communication channels may become open and accessible to attackers. Therefore, giving the property of fault tolerance to the used encryption systems is an urgent task. To solve this problem, the article proposes to use redundant residue codes in the polynomial ring (RCPR). The article describes a method of providing fault tolerance of AES encryption systems based on RCPR. Using the developed error correction algorithm for RCPR with one control module, the redundant RCPR can detect 100% of single and double errors, as well as correct 100% of single and 75% of double errors that occur during encryption and decryption. Thus, the developed method based on error correction of AES encryption system allows to parry cyberattacks on vehicles and ensure a higher level of cyber security of VANET. Full article
Show Figures

Figure 1

24 pages, 650 KB  
Article
Investigating Users’ Acceptance of Autonomous Buses by Examining Their Willingness to Use and Willingness to Pay: The Case of the City of Trikala, Greece
by Spyros Niavis, Nikolaos Gavanas, Konstantina Anastasiadou and Paschalis Arvanitidis
Urban Sci. 2025, 9(8), 298; https://doi.org/10.3390/urbansci9080298 - 1 Aug 2025
Viewed by 779
Abstract
Autonomous vehicles (AVs) have emerged as a promising sustainable urban mobility solution, expected to lead to enhanced road safety, smoother traffic flows, less traffic congestion, improved accessibility, better energy utilization and environmental performance, as well as more efficient passenger and freight transportation, in [...] Read more.
Autonomous vehicles (AVs) have emerged as a promising sustainable urban mobility solution, expected to lead to enhanced road safety, smoother traffic flows, less traffic congestion, improved accessibility, better energy utilization and environmental performance, as well as more efficient passenger and freight transportation, in terms of time and cost, due to better fleet management and platooning. However, challenges also arise, mostly related to data privacy, security and cyber-security, high acquisition and infrastructure costs, accident liability, even possible increased traffic congestion and air pollution due to induced travel demand. This paper presents the results of a survey conducted among 654 residents who experienced an autonomous bus (AB) service in the city of Trikala, Greece, in order to assess their willingness to use (WTU) and willingness to pay (WTP) for ABs, through testing a range of factors based on a literature review. Results useful to policy-makers were extracted, such as that the intention to use ABs was mostly shaped by psychological factors (e.g., users’ perceptions of usefulness and safety, and trust in the service provider), while WTU seemed to be positively affected by previous experience in using ABs. In contrast, sociodemographic factors were found to have very little effect on the intention to use ABs, while apart from personal utility, users’ perceptions of how autonomous driving will improve the overall life standards in the study area also mattered. Full article
Show Figures

Figure 1

59 pages, 2417 KB  
Review
A Critical Review on the Battery System Reliability of Drone Systems
by Tianren Zhao, Yanhui Zhang, Minghao Wang, Wei Feng, Shengxian Cao and Gong Wang
Drones 2025, 9(8), 539; https://doi.org/10.3390/drones9080539 - 31 Jul 2025
Viewed by 1085
Abstract
The reliability of unmanned aerial vehicle (UAV) energy storage battery systems is critical for ensuring their safe operation and efficient mission execution, and has the potential to significantly advance applications in logistics, monitoring, and emergency response. This paper reviews theoretical and technical advancements [...] Read more.
The reliability of unmanned aerial vehicle (UAV) energy storage battery systems is critical for ensuring their safe operation and efficient mission execution, and has the potential to significantly advance applications in logistics, monitoring, and emergency response. This paper reviews theoretical and technical advancements in UAV battery reliability, covering definitions and metrics, modeling approaches, state estimation, fault diagnosis, and battery management system (BMS) technologies. Based on international standards, reliability encompasses performance stability, environmental adaptability, and safety redundancy, encompassing metrics such as the capacity retention rate, mean time between failures (MTBF), and thermal runaway warning time. Modeling methods for reliability include mathematical, data-driven, and hybrid models, which are evaluated for accuracy and efficiency under dynamic conditions. State estimation focuses on five key battery parameters and compares neural network, regression, and optimization algorithms in complex flight scenarios. Fault diagnosis involves feature extraction, time-series modeling, and probabilistic inference, with multimodal fusion strategies being proposed for faults like overcharge and thermal runaway. BMS technologies include state monitoring, protection, and optimization, and balancing strategies and the potential of intelligent algorithms are being explored. Challenges in this field include non-unified standards, limited model generalization, and complexity in diagnosing concurrent faults. Future research should prioritize multi-physics-coupled modeling, AI-driven predictive techniques, and cybersecurity to enhance the reliability and intelligence of battery systems in order to support the sustainable development of unmanned systems. Full article
Show Figures

Figure 1

28 pages, 3144 KB  
Review
Artificial Intelligence-Driven and Bio-Inspired Control Strategies for Industrial Robotics: A Systematic Review of Trends, Challenges, and Sustainable Innovations Toward Industry 5.0
by Claudio Urrea
Machines 2025, 13(8), 666; https://doi.org/10.3390/machines13080666 - 29 Jul 2025
Viewed by 1120
Abstract
Industrial robots are undergoing a transformative shift as Artificial Intelligence (AI)-driven and bio-inspired control strategies unlock new levels of precision, adaptability, and multi-dimensional sustainability aligned with Industry 5.0 (energy efficiency, material circularity, and life-cycle emissions). This systematic review analyzes 160 peer-reviewed industrial robotics [...] Read more.
Industrial robots are undergoing a transformative shift as Artificial Intelligence (AI)-driven and bio-inspired control strategies unlock new levels of precision, adaptability, and multi-dimensional sustainability aligned with Industry 5.0 (energy efficiency, material circularity, and life-cycle emissions). This systematic review analyzes 160 peer-reviewed industrial robotics control studies (2023–2025), including an expanded bio-inspired/human-centric subset, to evaluate: (1) the dominant and emerging control methodologies; (2) the transformative role of digital twins and 5G-enabled connectivity; and (3) the persistent technical, ethical, and environmental challenges. Following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 guidelines, the study employs a rigorous methodology, focusing on adaptive control, deep reinforcement learning (DRL), human–robot collaboration (HRC), and quantum-inspired algorithms. The key findings highlight up to 30% latency reductions in real-time optimization, up to 22% efficiency gains through digital twins, and up to 25% energy savings from bio-inspired designs (all percentage ranges are reported relative to the comparator baselines specified in the cited sources). However, critical barriers remain, including scalability limitations (with up to 40% higher computational demands) and cybersecurity vulnerabilities (with up to 20% exposure rates). The convergence of AI, bio-inspired systems, and quantum computing is poised to enable sustainable, autonomous, and human-centric robotics, yet requires standardized safety frameworks and hybrid architectures to fully support the transition from Industry 4.0 to Industry 5.0. This review offers a strategic roadmap for future research and industrial adoption, emphasizing human-centric design, ethical frameworks, and circular-economy principles to address global manufacturing challenges. Full article
(This article belongs to the Section Robotics, Mechatronics and Intelligent Machines)
Show Figures

Figure 1

21 pages, 1133 KB  
Article
Research on China’s Innovative Cybersecurity Education System Oriented Toward Engineering Education Accreditation
by Yimei Yang, Jinping Liu and Yujun Yang
Information 2025, 16(8), 645; https://doi.org/10.3390/info16080645 - 29 Jul 2025
Viewed by 352
Abstract
This study, based on engineering education accreditation standards, addresses the supply–demand imbalance in China’s cybersecurity talent cultivation by constructing a sustainable “education-industry-society” collaborative model. Through case studies at Huaihua University and other institutions, employing methods such as literature analysis, field research, and empirical [...] Read more.
This study, based on engineering education accreditation standards, addresses the supply–demand imbalance in China’s cybersecurity talent cultivation by constructing a sustainable “education-industry-society” collaborative model. Through case studies at Huaihua University and other institutions, employing methods such as literature analysis, field research, and empirical investigation, we systematically explore reform pathways for an innovative cybersecurity talent development system. The research proposes a “three-platform, four-module” practical teaching framework, where the coordinated operation of the basic skills training platform, comprehensive ability development platform, and innovation enhancement platform significantly improves students’ engineering competencies (practical courses account for 41.6% of the curriculum). Findings demonstrate that eight industry-academia practice bases established through deep collaboration effectively align teaching content with industry needs, substantially enhancing students’ innovative and practical abilities (172 national awards, 649 provincial awards). Additionally, the multi-dimensional evaluation mechanism developed in this study enables a comprehensive assessment of students’ professional skills, practical capabilities, and innovative thinking. These reforms have increased the employment rate of cybersecurity graduates to over 90%, providing a replicable solution to China’s talent shortage. The research outcomes offer valuable insights for discipline development under engineering education accreditation and contribute to implementing sustainable development concepts in higher education. Full article
(This article belongs to the Topic Explainable AI in Education)
Show Figures

Figure 1

42 pages, 1300 KB  
Article
A Hybrid Human-AI Model for Enhanced Automated Vulnerability Scoring in Modern Vehicle Sensor Systems
by Mohamed Sayed Farghaly, Heba Kamal Aslan and Islam Tharwat Abdel Halim
Future Internet 2025, 17(8), 339; https://doi.org/10.3390/fi17080339 - 28 Jul 2025
Viewed by 543
Abstract
Modern vehicles are rapidly transforming into interconnected cyber–physical systems that rely on advanced sensor technologies and pervasive connectivity to support autonomous functionality. Yet, despite this evolution, standardized methods for quantifying cybersecurity vulnerabilities across critical automotive components remain scarce. This paper introduces a novel [...] Read more.
Modern vehicles are rapidly transforming into interconnected cyber–physical systems that rely on advanced sensor technologies and pervasive connectivity to support autonomous functionality. Yet, despite this evolution, standardized methods for quantifying cybersecurity vulnerabilities across critical automotive components remain scarce. This paper introduces a novel hybrid model that integrates expert-driven insights with generative AI tools to adapt and extend the Common Vulnerability Scoring System (CVSS) specifically for autonomous vehicle sensor systems. Following a three-phase methodology, the study conducted a systematic review of 16 peer-reviewed sources (2018–2024), applied CVSS version 4.0 scoring to 15 representative attack types, and evaluated four free source generative AI models—ChatGPT, DeepSeek, Gemini, and Copilot—on a dataset of 117 annotated automotive-related vulnerabilities. Expert validation from 10 domain professionals reveals that Light Detection and Ranging (LiDAR) sensors are the most vulnerable (9 distinct attack types), followed by Radio Detection And Ranging (radar) (8) and ultrasonic (6). Network-based attacks dominate (104 of 117 cases), with 92.3% of the dataset exhibiting low attack complexity and 82.9% requiring no user interaction. The most severe attack vectors, as scored by experts using CVSS, include eavesdropping (7.19), Sybil attacks (6.76), and replay attacks (6.35). Evaluation of large language models (LLMs) showed that DeepSeek achieved an F1 score of 99.07% on network-based attacks, while all models struggled with minority classes such as high complexity (e.g., ChatGPT F1 = 0%, Gemini F1 = 15.38%). The findings highlight the potential of integrating expert insight with AI efficiency to deliver more scalable and accurate vulnerability assessments for modern vehicular systems.This study offers actionable insights for vehicle manufacturers and cybersecurity practitioners, aiming to inform strategic efforts to fortify sensor integrity, optimize network resilience, and ultimately enhance the cybersecurity posture of next-generation autonomous vehicles. Full article
Show Figures

Figure 1

37 pages, 1895 KB  
Review
A Review of Artificial Intelligence and Deep Learning Approaches for Resource Management in Smart Buildings
by Bibars Amangeldy, Timur Imankulov, Nurdaulet Tasmurzayev, Gulmira Dikhanbayeva and Yedil Nurakhov
Buildings 2025, 15(15), 2631; https://doi.org/10.3390/buildings15152631 - 25 Jul 2025
Cited by 1 | Viewed by 1283
Abstract
This comprehensive review maps the fast-evolving landscape in which artificial intelligence (AI) and deep-learning (DL) techniques converge with the Internet of Things (IoT) to manage energy, comfort, and sustainability across smart environments. A PRISMA-guided search of four databases retrieved 1358 records; after applying [...] Read more.
This comprehensive review maps the fast-evolving landscape in which artificial intelligence (AI) and deep-learning (DL) techniques converge with the Internet of Things (IoT) to manage energy, comfort, and sustainability across smart environments. A PRISMA-guided search of four databases retrieved 1358 records; after applying inclusion criteria, 143 peer-reviewed studies published between January 2019 and April 2025 were analyzed. This review shows that AI-driven controllers—especially deep-reinforcement-learning agents—deliver median energy savings of 18–35% for HVAC and other major loads, consistently outperforming rule-based and model-predictive baselines. The evidence further reveals a rapid diversification of methods: graph-neural-network models now capture spatial interdependencies in dense sensor grids, federated-learning pilots address data-privacy constraints, and early integrations of large language models hint at natural-language analytics and control interfaces for heterogeneous IoT devices. Yet large-scale deployment remains hindered by fragmented and proprietary datasets, unresolved privacy and cybersecurity risks associated with continuous IoT telemetry, the growing carbon and compute footprints of ever-larger models, and poor interoperability among legacy equipment and modern edge nodes. The authors of researches therefore converges on several priorities: open, high-fidelity benchmarks that marry multivariate IoT sensor data with standardized metadata and occupant feedback; energy-aware, edge-optimized architectures that lower latency and power draw; privacy-centric learning frameworks that satisfy tightening regulations; hybrid physics-informed and explainable models that shorten commissioning time; and digital-twin platforms enriched by language-model reasoning to translate raw telemetry into actionable insights for facility managers and end users. Addressing these gaps will be pivotal to transforming isolated pilots into ubiquitous, trustworthy, and human-centered IoT ecosystems capable of delivering measurable gains in efficiency, resilience, and occupant wellbeing at scale. Full article
(This article belongs to the Section Building Energy, Physics, Environment, and Systems)
Show Figures

Figure 1

36 pages, 1680 KB  
Article
Guarding Our Vital Systems: A Metric for Critical Infrastructure Cyber Resilience
by Muharman Lubis, Muhammad Fakhrul Safitra, Hanif Fakhrurroja and Alif Noorachmad Muttaqin
Sensors 2025, 25(15), 4545; https://doi.org/10.3390/s25154545 - 22 Jul 2025
Viewed by 772
Abstract
The increased occurrence and severity of cyber-attacks on critical infrastructure have underscored the need to embrace systematic and prospective approaches to resilience. The current research takes as its hypothesis that the InfraGuard Cybersecurity Framework—a capability model that measures the maturity of cyber resilience [...] Read more.
The increased occurrence and severity of cyber-attacks on critical infrastructure have underscored the need to embrace systematic and prospective approaches to resilience. The current research takes as its hypothesis that the InfraGuard Cybersecurity Framework—a capability model that measures the maturity of cyber resilience through three functional pillars, Cyber as a Shield, Cyber as a Space, and Cyber as a Sword—is an implementable and understandable means to proceed with. The model treats the significant aspects of situational awareness, active defense, risk management, and recovery from incidents and is measured using globally standardized maturity models like ISO/IEC 15504, NIST CSF, and COBIT. The contributions include multidimensional measurements of resilience, a scored scale of capability (0–5), and domain-based classification enabling organizations to assess and enhance their cybersecurity situation in a formalized manner. The framework’s applicability is illustrated in three exploratory settings of power grids, healthcare systems, and airports, each constituting various levels of maturity in resilience. This study provides down-to-earth recommendations to policymakers through the translation of the attributes of resilience into concrete assessment indicators, promoting policymaking, investment planning, and global cyber defense collaboration. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

35 pages, 3265 KB  
Article
Cyber Edge: Current State of Cybersecurity in Aotearoa-New Zealand, Opportunities, and Challenges
by Md. Rajib Hasan, Nurul I. Sarkar, Noor H. S. Alani and Raymond Lutui
Electronics 2025, 14(14), 2915; https://doi.org/10.3390/electronics14142915 - 21 Jul 2025
Viewed by 539
Abstract
This study investigates the cybersecurity landscape of Aotearoa-New Zealand through a culturally grounded lens, focusing on the integration of Indigenous Māori values into cybersecurity frameworks. In response to escalating cyber threats, the research adopts a mixed-methods and interdisciplinary approach—combining surveys, focus groups, and [...] Read more.
This study investigates the cybersecurity landscape of Aotearoa-New Zealand through a culturally grounded lens, focusing on the integration of Indigenous Māori values into cybersecurity frameworks. In response to escalating cyber threats, the research adopts a mixed-methods and interdisciplinary approach—combining surveys, focus groups, and case studies—to explore how cultural principles such as whanaungatanga (collective responsibility) and manaakitanga (care and respect) influence digital safety practices. The findings demonstrate that culturally informed strategies enhance trust, resilience, and community engagement, particularly in rural and underserved Māori communities. Quantitative analysis revealed that 63% of urban participants correctly identified phishing attempts compared to 38% of rural participants, highlighting a significant urban–rural awareness gap. Additionally, over 72% of Māori respondents indicated that cybersecurity messaging was more effective when delivered through familiar cultural channels, such as marae networks or iwi-led training programmes. Focus groups reinforced this, with participants noting stronger retention and behavioural change when cyber risks were communicated using Māori metaphors, language, or values-based analogies. The study also confirms that culturally grounded interventions—such as incorporating Māori motifs (e.g., koru, poutama) into secure interface design and using iwi structures to disseminate best practices—can align with international standards like NIST CSF and ISO 27001. This compatibility enhances stakeholder buy-in and demonstrates universal applicability in multicultural contexts. Key challenges identified include a cybersecurity talent shortage in remote areas, difficulties integrating Indigenous perspectives into mainstream policy, and persistent barriers from the digital divide. The research advocates for cross-sector collaboration among government, private industry, and Indigenous communities to co-develop inclusive, resilient cybersecurity ecosystems. Based on the UTAUT and New Zealand’s cybersecurity vision “Secure Together—Tō Tātou Korowai Manaaki 2023–2028,” this study provides a model for small nations and multicultural societies to create robust, inclusive cybersecurity frameworks. Full article
(This article belongs to the Special Issue Intelligent Solutions for Network and Cyber Security)
Show Figures

Figure 1

20 pages, 1851 KB  
Article
ISO-Based Framework Optimizing Industrial Internet of Things for Sustainable Supply Chain Management
by Emad Hashiem Abualsauod
Sustainability 2025, 17(14), 6421; https://doi.org/10.3390/su17146421 - 14 Jul 2025
Viewed by 558
Abstract
The Industrial Internet of Things (IIoT) offers transformative potential for supply chain management by enabling automation, real-time monitoring, and predictive analytics. However, fragmented standardization, interoperability challenges, and cybersecurity risks hinder its sustainable adoption. This study aims to develop and validate an ISO-based framework [...] Read more.
The Industrial Internet of Things (IIoT) offers transformative potential for supply chain management by enabling automation, real-time monitoring, and predictive analytics. However, fragmented standardization, interoperability challenges, and cybersecurity risks hinder its sustainable adoption. This study aims to develop and validate an ISO-based framework to optimize IIoT networks for sustainable supply chain operations. A quantitative time-series research design was employed, analyzing 150 observations from 10–15 industrial firms over five years. Analytical methods included ARIMA, structural equation modeling (SEM), and XGBoost for predictive evaluation. The findings indicate a 6.2% increase in system uptime, a 4.7% reduction in operational costs, a 2.8% decrease in lead times, and a 55–60% decline in security incidents following ISO standard implementation. Interoperability improved by 40–50%, and integration cost savings ranged from 35–40%, contributing to a 25% boost in overall operational efficiency. These results underscore the critical role of ISO frameworks such as ISO/IEC 30141 and ISO 50001 in enhancing connectivity, energy efficiency, and network security across IIoT-enabled supply chains. While standardization significantly improves key performance indicators, the persistence of lead time variability suggests the need for additional optimization strategies. This study offers a structured and scalable methodology for ISO-based IIoT integration, delivering both theoretical advancement and practical relevance. By aligning with internationally recognized sustainability standards, it provides policymakers, practitioners, and industry leaders with an evidence-based framework to accelerate digital transformation, enhance operational efficiency, and support resilient, sustainable supply chain development in the context of Industry 4.0. Full article
(This article belongs to the Special Issue Network Operations and Supply Chain Management)
Show Figures

Figure 1

34 pages, 924 KB  
Systematic Review
Smart Microgrid Management and Optimization: A Systematic Review Towards the Proposal of Smart Management Models
by Paul Arévalo, Dario Benavides, Danny Ochoa-Correa, Alberto Ríos, David Torres and Carlos W. Villanueva-Machado
Algorithms 2025, 18(7), 429; https://doi.org/10.3390/a18070429 - 11 Jul 2025
Cited by 1 | Viewed by 931
Abstract
The increasing integration of renewable energy sources (RES) in power systems presents challenges related to variability, stability, and efficiency, particularly in smart microgrids. This systematic review, following the PRISMA 2020 methodology, analyzed 66 studies focused on advanced energy storage systems, intelligent control strategies, [...] Read more.
The increasing integration of renewable energy sources (RES) in power systems presents challenges related to variability, stability, and efficiency, particularly in smart microgrids. This systematic review, following the PRISMA 2020 methodology, analyzed 66 studies focused on advanced energy storage systems, intelligent control strategies, and optimization techniques. Hybrid storage solutions combining battery systems, hydrogen technologies, and pumped hydro storage were identified as effective approaches to mitigate RES intermittency and balance short- and long-term energy demands. The transition from centralized to distributed control architectures, supported by predictive analytics, digital twins, and AI-based forecasting, has improved operational planning and system monitoring. However, challenges remain regarding interoperability, data privacy, cybersecurity, and the limited availability of high-quality data for AI model training. Economic analyses show that while initial investments are high, long-term operational savings and improved resilience justify the adoption of advanced microgrid solutions when supported by appropriate policies and financial mechanisms. Future research should address the standardization of communication protocols, development of explainable AI models, and creation of sustainable business models to enhance resilience, efficiency, and scalability. These efforts are necessary to accelerate the deployment of decentralized, low-carbon energy systems capable of meeting future energy demands under increasingly complex operational conditions. Full article
(This article belongs to the Special Issue Algorithms for Smart Cities (2nd Edition))
Show Figures

Figure 1

28 pages, 635 KB  
Systematic Review
A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats
by Pedro Santos, Rafael Abreu, Manuel J. C. S. Reis, Carlos Serôdio and Frederico Branco
Sensors 2025, 25(14), 4272; https://doi.org/10.3390/s25144272 - 9 Jul 2025
Viewed by 2247
Abstract
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify the most effective tools and methodologies for threat detection [...] Read more.
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify the most effective tools and methodologies for threat detection and prevention, and highlight the limitations of current approaches. An extensive search of academic databases was conducted following the PRISMA guidelines, including 43 relevant studies. This number reflects a rigorous selection process based on defined inclusion, exclusion, and quality criteria and is consistent with the scope of similar systematic reviews in the field of cyber threat intelligence. This review concludes that while CTI significantly improves the ability to predict and prevent cyber threats, challenges such as data standardization, privacy concerns, and trust between organizations persist. It also underscores the necessity of continuously improving CTI practices by leveraging the integration of advanced technologies and creating enhanced collaboration frameworks. These advancements are essential for developing a robust and adaptive cybersecurity posture capable of responding to an evolving threat landscape, ultimately contributing to a more secure digital environment for all sectors. Overall, the review provides practical reflections on the current state of CTI and suggests future research directions to strengthen and improve CTI’s effectiveness. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Back to TopTop