14Security in Blockchain‐Based Smart Cyber‐Physical Applications Relying on Wireless Sensor and Actuators Networks
Maria A. de Jesus1, Asif A. Laghari2, Abdullah A. Khan3, Awais Khan Jumani4, Mohammad Shabaz5, Anand Deshpande6, R. Jenice Aroma7, Kumudha Raimond8, and Asiya Khan9
1Department of Telecommunications, Federal Fluminense University (UFF), Niterói, RJ, Brazil
2Sindh Madresstul Islam University, Karachi, Sindh, Pakistan
3Research Lab of Artificial Intelligence and Information Security, Faculty of Computing, Science and Information Technology, Benazir Bhutto Shaheed University, Karachi, Sindh, Pakistan
4Department of Computer Science, Sindh Madressa‐tul‐Islam University, Karachi, Sindh, Pakistan
5Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India
6Electronics and Communication Engineering, Angadi Institute of Technology and Management, Belagavi, India
7Department of CSE, Karunya Institute of Technology and Sciences, Karunya University, Coimbatore, India
8Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India
9School of Engineering, Computing and Mathematics (Faculty of Science and Engineering), University of Plymouth, Plymouth, UK
14.1 Introduction
A “business sector” can be any potential application field, such as banking, agribusiness, disaster relief, etc. Nowadays, the “cyber‐physical system” (CPS) rationale [1–4], i.e., a framework placing together computation ...
Get Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.