Change search
Link to record
Permanent link

Direct link
Publications (10 of 38) Show all publications
Kour, R., Karim, R., Venkatesh, N. & Jägare, V. (2026). A Framework for Development of Industrial Metaverse in Maintenance. In: Proceedings of the UNIfied Conference of DAMAS, IncoME VIII and TEPEN Conferences: (pp. 83-94). Singapore: -
Open this publication in new window or tab >>A Framework for Development of Industrial Metaverse in Maintenance
2026 (English)In: Proceedings of the UNIfied Conference of DAMAS, IncoME VIII and TEPEN Conferences, Singapore: - , 2026, p. 83-94Chapter in book (Refereed)
Abstract [en]

The industrial evolution has emerged the concept of Industry 5.0 paradigm. The concept of Industry 5.0 emphasizes three main aspects of industrial development, i.e. sustainability, resilience, and human centric. The emerging tech-nologies related to digitalisation and artificial intelligence are expected to augment human-system-interaction in various industrial processes. Integrating AI and digital technologies to enable human-centric solutions in industry can manifest in a concept called “Industrial Metaverse”. The Industrial Metaverse is considered a concept that emerged from integrating the Metaverse and Digital Twin, but adapted to specific characteristics of industrial contexts. Industrial Metaverse can enhance Asset Management (AM) within the Industry 5.0 framework. By integrating AI and advanced digital technologies, the Metaverse offers a promising roadmap for optimising human-system interaction in industrial contexts. Metaverse is expected to enhance human centricity of Industry 5.0 and developing metaverse in industrial contexts is challenging and requires a framework. Hence, this paper provides a framework that helps to develop Industrial Metaverse in the context of AM specifically in maintenance. This paper employs literature review in popular databases and discussions with industrial stakeholders to present the current landscape of Metaverse application in Industry 5.0 with a specific focus on maintenance. A case study from the railway sector demonstrates the practical benefits of the Metaverse in improving operational efficiency and maintenance processes. The findings contribute to understanding the Metaverse’s role in shaping the future of industrial asset management and maintenance within Industry 5.0.

Place, publisher, year, edition, pages
Singapore: -, 2026
Keywords
Industry 5.0, Railways, Industrial metaverse, Maintenance
National Category
Reliability and Maintenance
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-115197 (URN)10.1007/978-3-031-95963-9_7 (DOI)
Available from: 2025-10-21 Created: 2025-10-21 Last updated: 2025-10-22
Kour, R., Karim, R. & Wägenbauer, A. (2026). Annoyed by cybersecurity? Human-centric perspectives on cybersecurity. Frontiers in Computer Science, 8, Article ID 1764808.
Open this publication in new window or tab >>Annoyed by cybersecurity? Human-centric perspectives on cybersecurity
2026 (English)In: Frontiers in Computer Science, E-ISSN 2624-9898, Vol. 8, article id 1764808Article, review/survey (Refereed) Published
Abstract [en]

Humans play a vital role in designing, developing, implementing, and using technical systems. For this reason, it is crucial to keep humans in the loop at each phase of these systems to make them more secure and user-friendly. There needs to be a balance between using these systems securely and making them easy to use. Today, under pressure to secure our systems from cyberattacks, we primarily focus on making them secure but often overlook making them easy to use. Thus, the objective of this paper is to provide a human-centric perspective on cybersecurity and to introduce a human-centric framework that enables Industry 5.0, where humans have direct interaction with systems and solutions that are more customer-oriented. To carry out this research, the authors have applied the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to investigate human-centric research over a 10-year period, from 2015 to 2025. The literature shows that most human-centric research contributions are well-balanced, with conceptual, experimental, and survey approaches each accounting for approximately 64% of the total, indicating a mature blend of theoretical and applied research. These studies are focused on developing structured, strategic approaches that integrate human factors into cybersecurity practices across sectors such as education, government, health, software, smart home networks, and others. To conduct this research, the authors have prepared an anonymous questionnaire with fundamental questions about secure system’s design, which can be easily used. The evaluation results show that frequent password resets (33.3%) and frequent authentication (26.7%) are the most “annoying” cybersecurity measures. Additionally, most respondents consider biometric login the most user-friendly security feature, followed by single sign-on and automatic security patch updates. What is missing in existing literature and studies is a holistic perspective on human-centrism, beyond mere ease of use. We aim to cover that blind spot by introducing our independently developed framework in this paper.

Place, publisher, year, edition, pages
Frontiers Media S.A., 2026
National Category
Computer Sciences
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-116598 (URN)10.3389/fcomp.2026.1764808 (DOI)
Funder
Luleå University of Technology
Note

Full text: CC BY license;

Available from: 2026-03-02 Created: 2026-03-02 Last updated: 2026-03-02
Kour, R. & Karim, R. (2026). Cybersecurity framework for Operator 5.0. Organizational Cybersecurity Journal: Practice, Process and People, 1-13
Open this publication in new window or tab >>Cybersecurity framework for Operator 5.0
2026 (English)In: Organizational Cybersecurity Journal: Practice, Process and People, ISSN 2635-0270, p. 1-13Article in journal (Refereed) Published
Abstract [en]

Purpose: Operator 5.0 represents a paradigm shift in how humans and machines interact and work together in industrial contexts. It leverages advanced digital technologies and automation to optimise processes, enhance productivity and create new possibilities. However, these advanced possibilities also introduce significant cybersecurity challenges. This paper explores the cybersecurity challenges and threats faced by Operator 5.0, emphasising the vulnerabilities inherent in human-machine collaboration, industrial IoT and supply chain integration.

Design/methodology/approach: The paper uses a qualitative approach, using a literature review, to analyse the cybersecurity risks associated with Operator 5.0 and proposes a comprehensive cybersecurity framework to address these challenges.

Findings: The paper identifies key vulnerabilities arising from human–machine collaboration, IIoT and supply chain integration within the Operator 5.0 context. It argues that these vulnerabilities pose significant risks to industrial operations and sensitive data. The proposed framework offers a multi-layered approach to mitigating these risks.

Originality/value: This paper offers a novel perspective on the cybersecurity implications of Operator 5.0. It proposes a holistic framework integrating hardware, software and liveware (human element) to establish human-centric security measures, advanced threat detection and response mechanisms and resilient infrastructure for Operator 5.0 deployments.

National Category
Engineering and Technology
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-116599 (URN)10.1108/ocj-02-2025-0007 (DOI)
Funder
Vinnova, 2023-02788
Available from: 2026-03-02 Created: 2026-03-02 Last updated: 2026-03-02
Kharnotia, S., Arora, B. & Kour, R. (2026). Feature-Driven Static Analysis for Learning-Based Android Malware Detection: A Review. ICT Express
Open this publication in new window or tab >>Feature-Driven Static Analysis for Learning-Based Android Malware Detection: A Review
2026 (English)In: ICT Express, ISSN 2405-9595Article, review/survey (Refereed) Epub ahead of print
Abstract [en]

The extensive embrace of Android has amplified malware risks, resulting in a need for better detection methods. This article investigates the area of static analysis, which analyses applications without execution by examining code and manifest files. We focus on studies from 2022–2025, regarding the feature extraction, datasets, feature selection, and approaches based on Machine Learning (ML) and Deep Learning (DL). We conclude by defining the major limitations and research gaps presented in studies regarding static analysis, and many insights for potential development of detection models that are efficient, accurate, and lightweight to improve detection patterns of Android malware.

Place, publisher, year, edition, pages
Korean Institute of Communications and Information Sciences (KICS), 2026
Keywords
Android, Static analysis, Malware detection, Machine learning, Mobile security
National Category
Computer Sciences
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-115913 (URN)10.1016/j.icte.2026.01.005 (DOI)2-s2.0-105027336837 (Scopus ID)
Note

Full text license: CC BY

Available from: 2026-01-09 Created: 2026-01-09 Last updated: 2026-02-05
Adoul, M. A., Subramanian, B., Venkatesh, N., Karim, R. & Kour, R. (2025). Experimental investigation and machine learning-based estimation of oxyhydrogen (HHO) gas production using KOH electrolyte in a flat plate electrolyser. Fuel processing technology, 278, Article ID 108339.
Open this publication in new window or tab >>Experimental investigation and machine learning-based estimation of oxyhydrogen (HHO) gas production using KOH electrolyte in a flat plate electrolyser
Show others...
2025 (English)In: Fuel processing technology, ISSN 0378-3820, E-ISSN 1873-7188, Vol. 278, article id 108339Article in journal (Refereed) Published
Abstract [en]

Hydrogen gas has gained significant attention as a cleaner alternative to fossil fuels offering a sustainable energy solution. This study explores the production efficiency of oxyhydrogen (HHO) gas using a flat plate electrolyser with potassium hydroxide (KOH) as the electrolyte. Machine learning regression models were employed to estimate hydrogen generation rates and system efficiency based on key operational parameters that includes voltage, current and electrolyte concentration. A set of gradient-boosting algorithms was evaluated utilizing raw experimental data to predict (i) hydrogen output in liters per minute (LPM) and (ii) system efficiency. The results indicate that Categorical Boosting (CatBoost) excelled in forecasting system efficiency (R2 = 0.9748, RMSE = 1.6567 on testing data) and predicting HHO gas generation rate (R2 = 0.9936, RMSE = 0.0090). The experimental results show that with the increase in KOH concentration there is increase in production of Hydrogen. Maximum efficiency was noted with 0.5 N of KOH with the peak efficiency of 99.8 % because of its optimal conductivity and power consumption. It can also be absorbed that higher concentration such 0.75 N and 1 N have shown significant improvement in hydrogen production. Experimental findings further revealed that moderate operating conditions maximize hydrogen production with efficiency varying as a function of applied current and electrolyte concentration. This study highlights the advantages of integrating machine learning models with electrolysis-based hydrogen production offering a scalable and data-driven approach to optimizing energy efficiency. The results underscore the potential of KOH-based electrolysis for sustainable hydrogen generation and reinforce the role of predictive modeling in enhancing system performance.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
HHO gas, Flate plate electrolyser, Machine learning, Prediction analysis
National Category
Electrical Engineering, Electronic Engineering, Information Engineering Mechanical Engineering
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-114875 (URN)10.1016/j.fuproc.2025.108339 (DOI)001577634300001 ()2-s2.0-105016458523 (Scopus ID)
Note

Validerad;2025;Nivå 2;2025-09-30 (u2);

Full text: CC BY license;

Available from: 2025-09-23 Created: 2025-09-23 Last updated: 2025-11-28Bibliographically approved
Adoul, M. A., Subramanian, B., Venkatesh, N., Karim, R. & Kour, R. (2025). Gradient boosting-based estimation of oxyhydrogen production in a flat-plate electrolyser using sodium hydroxide electrolyte. Energy Conversion and Management: X, 28, Article ID 101276.
Open this publication in new window or tab >>Gradient boosting-based estimation of oxyhydrogen production in a flat-plate electrolyser using sodium hydroxide electrolyte
Show others...
2025 (English)In: Energy Conversion and Management: X, ISSN 2590-1745, Vol. 28, article id 101276Article in journal (Refereed) Published
Abstract [en]

The integration of oxyhydrogen (HHO) gas into internal combustion (IC) engines has attracted substantial interest among researchers in improving engine performance and reducing emissions. In the present work, a wet-type flat-plate electrolyser utilizing sodium hydroxide (NaOH) as electrolyte is investigated to determine the interdependent effects of voltage, current, and NaOH concentration on HHO gas generation rate and system efficiency. The results show that moderate current and voltage levels, along with higher NaOH concentrations (e.g., 5.87 V and 1 N) yield a maximum gas production rate of 0.5 L/min while conserving energy efficiency. The experimental analysis also showed that as the current increase the rate of production also increased. The maximum production of 0.5 L/min was achieved with 30 A. The study also extends to use experimental data to train machine learning algorithm to estimate the performance of the HHO gas system. Voltage, current, power consumption, resistance and electrolyte concentration were used as input parameters while efficiency and HHO gas production were the output parameters measured with a total dataset size of 112 observations. To reduce the experimental burden and establish an efficient predictive framework five gradient boosting algorithms namely, categorical boosting (CatBoost), extreme gradient boosting (XGBoost), light gradient boosting machine (LightGBM), adaptive boosting (AdaBoost) and gradient boosting (GB) are evaluated among which CatBoost achieved maximum accuracy with R2 values of 0.9903 (for hydrogen production) and 0.9583 (for efficiency) on test data. The findings highlight how crucial intermediate operating conditions are for optimizing gas output and efficiency while lowering resource usage.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
HHO gas, Flat plate electrolyser, Machine learning, Prediction analys
National Category
Energy Engineering
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-114874 (URN)10.1016/j.ecmx.2025.101276 (DOI)001586027300003 ()2-s2.0-105016889238 (Scopus ID)
Note

Validerad;2025;Nivå 1;2025-09-30 (u2);

Full text: CC BY license;

Available from: 2025-09-23 Created: 2025-09-23 Last updated: 2025-11-28Bibliographically approved
Khanna, P., Kour, R. & Karim, R. (2025). Human-centric Maintenance Process Through Integration of AI, Speech, and AR. In: : . Paper presented at IAI 2025.
Open this publication in new window or tab >>Human-centric Maintenance Process Through Integration of AI, Speech, and AR
2025 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The adoption of Augmented Reality (AR) is increasing to enhance Human-System Interaction (HSI) by creating immersive experiences that improve efficiency and safety in various industries. In industrial maintenance, traditional practices involve physical documentation and device interactions, which might disrupt the task, affect efficiency, and increase the cognitive load for the maintenance personnel. AR has the potential to support and enhance industrial maintenance processes in these aspects. Therefore, the purpose of this research is to study and explore how advanced technologies like Artificial Intelligence (AI), AR and speech processing can be integrated to support hands-free, real-time task logging and interaction in maintenance environments. This is done by developing a demonstrator for Microsoft HoloLens 2 using Unity, C#, Azure Cognitive Services, and Azure Functions, which enables speech-to-text transcription for hands-free maintenance support. Using Azure’s speech recognition, the demonstrator can achieve high transcription accuracy in an AR environment, facilitating natural interactions between users and the augmented environment. The study aims to explore the potential of AR to reduce cognitive load, streamline workflows, and improve safety by enhancing HSI for maintenance personnel in high-stakes environments. 

National Category
Human Computer Interaction
Identifiers
urn:nbn:se:ltu:diva-115416 (URN)
Conference
IAI 2025
Available from: 2025-11-17 Created: 2025-11-17 Last updated: 2026-01-14
Kour, R., Karim, R., Patwardhan, A., Venkatesh, N. & Adoul, M. A. (2025). Industrial Cybersecurity: Current Trends and Challenges. In: E. B. Abrahamsen; T. Aven; F. Bouder; R. Flage; M. Ylönen (Ed.), Proceedings of the 35th European Safety and Reliability Conference (ESREL 2025) and the 33rd Society for Risk Analysis Europe Conference (SRA-E 2025): . Paper presented at 35th European Safety and Reliability & 33rd Society for Risk Analysis Europe Conference (ESREL & SRA-E 2025), Stavanger, Norway, June 15-19, 2025 (pp. 2876-2883). Singapore: Research Publishing, Article ID P4283.
Open this publication in new window or tab >>Industrial Cybersecurity: Current Trends and Challenges
Show others...
2025 (English)In: Proceedings of the 35th European Safety and Reliability Conference (ESREL 2025) and the 33rd Society for Risk Analysis Europe Conference (SRA-E 2025) / [ed] E. B. Abrahamsen; T. Aven; F. Bouder; R. Flage; M. Ylönen, Singapore: Research Publishing , 2025, p. 2876-2883, article id P4283Conference paper, Published paper (Refereed)
Abstract [en]

Industrial cybersecurity has become a critical concern in today's interconnected world, as critical infrastructure systems increasingly rely on digital technologies. This paper explores the unique challenges and opportunities presented by industrial cybersecurity, highlighting the need for enhanced cybersecurity measures. The paper discusses the potential consequences of cyberattacks on industrial systems, including disruptions to critical services, economic losses, and even physical harm. To address these challenges, this paper discusses cybersecurity initiatives, standards, guidelines, directives, and acts that can provide a comprehensive framework for cybersecurity and AI governance. A systematic literature review has been conducted in this paper using Scopus and Google Scholar, which provide the foundation for identifying relevant publications. These publications show key trends and themes in industrial cybersecurity research, including the growing importance of education and training, as well as cybersecurity risk assessment and mitigation.

Place, publisher, year, edition, pages
Singapore: Research Publishing, 2025
Keywords
Industrial Cybersecurity, operational technology, cyberattack, framework
National Category
Computer Systems
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-113021 (URN)10.3850/978-981-94-3281-3_ESREL-SRA-E2025-P4283-cd (DOI)
Conference
35th European Safety and Reliability & 33rd Society for Risk Analysis Europe Conference (ESREL & SRA-E 2025), Stavanger, Norway, June 15-19, 2025
Note

ISBN for host publication: 978-981-94-3281-3

Available from: 2025-06-09 Created: 2025-06-09 Last updated: 2025-10-21Bibliographically approved
Kour, R., Karim, R., Venkatesh, N. & Kumar, U. (2025). Metaverse in industrial contexts - a comprehensive review. Frontiers in Virtual Reality, 6, Article ID 1488926.
Open this publication in new window or tab >>Metaverse in industrial contexts - a comprehensive review
2025 (English)In: Frontiers in Virtual Reality, E-ISSN 2673-4192, Vol. 6, article id 1488926Article, review/survey (Refereed) Published
Abstract [en]

This paper explores the potential of Metaverse technology in industrial Asset Management (AM). By integrating AI and digital technologies, the Metaverse can enhance Human-System-Interaction (HSI) and optimise AM processes. However, implementing a Metaverse in industrial contexts faces challenges, particularly in visualising physical and virtual assets. This paper conducts a systematic review to address these challenges and identify potential solutions. The findings reveal that while the necessary technologies are available, their widespread adoption in industrial AM is limited. The paper presents a comprehensive overview of research themes related to Metaverse applications in industrial contexts, highlighting the evolving landscape and potential benefits. Ultimately, this research aims to contribute to the advancement of Metaverse technology in industrial AM by providing insights into its development, implementation, and challenges along with an Industrial Metaverse Framework. An example of applying the Metaverse concept in the railway sector has been presented and validated using railway digital assets available within the eMaintenance LAB. The practical implications of this work are expected to result in increased efficiency and effectiveness in the operation and maintenance procedures across various industrial sectors.

Place, publisher, year, edition, pages
Frontiers Media S.A., 2025
Keywords
Industrial, Metaverse, review, Railway, asset management
National Category
Computer Systems
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-111280 (URN)10.3389/frvir.2025.1488926 (DOI)001416226600001 ()2-s2.0-85217404971 (Scopus ID)
Funder
VinnovaLuleå Railway Research Centre (JVTC)
Note

Validerad;2025;Nivå 1;2025-02-20 (u8);

Full text license: CC BY

Available from: 2025-01-13 Created: 2025-01-13 Last updated: 2025-10-21Bibliographically approved
Kour, R., Karim, R. & Dersin, P. (2025). Modelling cybersecurity strategies with game theory and cyber kill chain. International Journal of Systems Assurance Engineering and Management
Open this publication in new window or tab >>Modelling cybersecurity strategies with game theory and cyber kill chain
2025 (English)In: International Journal of Systems Assurance Engineering and Management, ISSN 0975-6809, E-ISSN 0976-4348Article in journal (Refereed) Epub ahead of print
Abstract [en]

Digitalisation within industries has many posi- tive opportunities but poses many cybersecurity-related threats. Cybersecurity is a critical concern for many indus- tries, such as railway, aviation, mining, construction, health- care, and finance, where vital information and operational security are at risk of being compromised. Today, research- ers are looking into various solutions to tackle cybersecurity risks while still retaining the desired functionality of the system. However, it is believed that these challenges can be approached by integrating game theory and the cyber kill chain (CKC), which describes the different stages of a cyberattack, to understand the complexities of cybersecu- rity. Thus, the primary objective of this paper is to demon- strate the application of a strategic game model within the context of cybersecurity, specifically using the cyber kill chain (CKC) model. The focus is on validating the proposed strategic game model through a case study. The case study involves a scenario where defenders select strategies such as “monitor system,” “detecting system,” and “respond to attack,” while attackers choose various attack strategies like “monitoring attack,” “scan the organization’s website,” and “develop malicious payloads” within the stages of the CKC. This approach aims to enhance understanding of the complex challenges and facilitate the development of effective cyber- security solutions. This approach will help in evaluating the effectiveness of different security strategies. The proposed strategic approach uses a non-cooperative game based on mixed strategies. The authors have defined a scenario for simultaneous-move games by estimating values for various elements of the game. By analysing the behaviour of both attacker and defender, the proposed game-based model can help industries develop more effective and efficient security strategies. Further, the proposed model will provide a better understanding of the complex challenges of cybersecurity in industrial contexts. It can also be used to develop appropri- ate strategies to mitigate cybersecurity risks.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Game theory, Cyber kill chain, Strategic approach, Probabilities, Case study, Cybersecurity
National Category
Computer and Information Sciences
Research subject
Operation and Maintenance Engineering
Identifiers
urn:nbn:se:ltu:diva-111723 (URN)10.1007/s13198-025-02733-4 (DOI)001427337000001 ()2-s2.0-85219188193 (Scopus ID)
Funder
Vinnova, 2019-05140Swedish Energy Agency
Note

Full text license: CC BY

Available from: 2025-02-24 Created: 2025-02-24 Last updated: 2025-10-21
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-0734-0959

Search in DiVA

Show all publications