Natasha Dutta’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (20)


SR-MLC: Scalable Resilience Machine Learning Classifiers Approach in Cyber Security
  • Article

January 2019

·

4 Reads

SSRN Electronic Journal

Anil Lamba

·

Natasha Dutta


Figure 1: 5G industries (Explained 2018)
Figure 3: Boston Consulting Group (Group 2015)
Figure 4: Key challenges for Industry 4.0 1-Digital skills: according to the Siemens Financial Services research survey, respondents have indicated three key areas of shortage, within digital skills domain: digital production expertise, digital maintenance capabilities and operating and
THREATS AND CHALLENGES OF CYBER-ENABLED INDUSTRIES UNDER FOURTH INDUSTRIAL REVOLUTION (IS IT SOLVING COMPLICATED PREDICAMENTS OR WELCOMING NEW THREATS?)
  • Article
  • Full-text available

June 2018

·

457 Reads

Anil Lamba

·

Satinderjeet Singh

·

·

[...]

·

Rela Muni
Download

Preventing and Detecting Cyber Attacks (Stl & Amf) on Additive Manufacturing (Am) Process Chain

May 2018

·

166 Reads

·

2 Citations

SSRN Electronic Journal








Citations (15)


... CC: the security persists in CC deployment, cloud vulnerabilities are time by time published and patches are updated according to the security concern (Lamba et al., 2016), all patching is deployed by CSP, and everyone belongs to IT organisations having security concerns. Through customer data, details like bank usage user login ID/password credentials are hacked that why security threats are existent. ...

Reference:

Systematic Analysis of On Premise and Cloud Services
A Comprehensive Survey on Security in Cloud Computing
  • Citing Article
  • January 2016

SSRN Electronic Journal

... In the past, such attacks have occurred in the real world; hence, we can say they were real-world attacks (RWA). Examples include Iran's uranium Stuxnet attack in 2010 that caused a sufficient setback to Iran's nuclear program and damaged their centrifuge [8]; the German steel mill attack in 2014 that caused significant loss (the mill avoided blast burning from shutting down) [9]; the power company attack in Ukraine in 2015 that detached small-level stations from the power grid, leaving millions of customers without power for a long time [10]; the similar attack in Ukraine in 2016 on transmission-level substations that disconnected capital without power for more than an hour [11]; and the attacks on the petrochemical plant in Saudi Arabia in 2017 that shut down the safety controller of the plant which could have caused massive loss, damage, or an explosion [12]. Industry, the malware behind the power grid attack in Ukraine in 2016 and the Saudi petrochemical attack in 2017 are still active in targeting energy sectors and electrical power substations [13,14]. ...

Mitigating Cyber Security Threats of Industrial Control Systems (Scada & Dcs)
  • Citing Article
  • January 2017

SSRN Electronic Journal

... Tree Protocol (STP) to transmit STP signals incessantly. to as SU (Server Unit) [22][23][24][25][26]. Every module interacts with the other modules through a set certificate as well as hierarchical rules. ...

S4: A Novel & Secure Method for Enforcing Privacy in Cloud Data Warehouses
  • Citing Article
  • January 2016

SSRN Electronic Journal

... Attackers exploit software vulnerabilities in IoT-enabled medical devices, embedding spyware into legitimate applications to capture patient records, login credentials, and financial details [11]. Additionally, supply chain attacks introduce spyware through third-party vendors, bypassing traditional security defenses [12]. ...

Embedding Machine & Deep Learning for Mitigating Security & Privacy Issues in IoT Enabled Devices & Networks
  • Citing Article
  • January 2018

SSRN Electronic Journal

... Therefore, conventional information gathering, management, and analysis methods might not operate on this scale [195,196]. Also, the complexity of the data produced by IoT provides a different front for the existing data processing mechanisms [197][198][199][200]. Personal security and data protection are two of the main considerations in the company implementation of IoT facilities and implementations [102,198]. ...

EMBEDDING MACHINE & DEEP LEARNING FOR MITIGATING SECURITY & PRIVACY ISSUES IN IOT ENABLED DEVICES & NETWORKS

... Copula is a function that can combine several single variable marginal distribution functions that are uniform in one dimension into one multivariable distribution function [16]. According to [17,18], copulas can better describe the dependencies between random variables. ...

MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS)

... Instead, IoT can easily take advantage of the decentralized capabilities offered by blockchain networks. From this point onward, future developments of the Internet of Things do not have to rely on centralized services for trust [42][43][44]. The Internet of Things (IoT) and Blockchain integration frameworks have both been the subject of in-depth research in recent scholarly works. ...

Mitigating IoT Security and Privacy Challenges Using Distributed Ledger Based Blockchain (Dl-BC) Technology

SSRN Electronic Journal

... We present a new approach that uses configuration information on firewalls and vulnerability information on all network devices to build attack graphs that show how far inside and outside attackers can progress through a network by successively compromising exposed and vulnerable hosts. [12] 2018, One of the key advantages of additive manufacturing (AM) is its digital thread, which allows for rapid communication, iteration, and sharing of a design model and its corresponding physical representation. While this enables a more efficient design process, it also presents opportunities for cyber-attacks to impact the physical word. ...

Preventing and Detecting Cyber Attacks (Stl & Amf) on Additive Manufacturing (Am) Process Chain

SSRN Electronic Journal

... The idea of integrating advanced technologies is an innovation in the transportation field. However, such integration increases the exposure to potential threats in the computing platform environment and introduces vulnerabilities to the in-vehicle cutting-edge technology [1]. Furthermore, it enhances the risk of taking control of the vehicle without permission from the vehicle owner [2], which considerably affects driver safety and vehicle security. ...

Identifying & Mitigating Cyber Security Threats in Vehicular Technologies

SSRN Electronic Journal