[HTML][HTML] Fake news outbreak 2021: Can we stop the viral spread?

T Khan, A Michalas, A Akhunzada - Journal of Network and Computer …, 2021 - Elsevier
Social Networks' omnipresence and ease of use has revolutionized the generation and
distribution of information in today's world. However, easy access to information does not …

Botnets: A survey

SSC Silva, RMP Silva, RCG Pinto, RM Salles - Computer Networks, 2013 - Elsevier
Botnets, which are networks formed by malware-compromised machines, have become a
serious threat to the Internet. Such networks have been created to conduct large-scale …

Understanding the mirai botnet

M Antonakakis, T April, M Bailey, M Bernhard… - 26th USENIX security …, 2017 - usenix.org
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …

Securing internet of medical things systems: Limitations, issues and recommendations

JPA Yaacoub, M Noura, HN Noura, O Salman… - Future Generation …, 2020 - Elsevier
Traditional health-care systems suffer from new challenges associated with the constant
increase in the number of patients. In order to address this issue, and to increase the …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

[PDF][PDF] Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning

S Lee, A Abdullah, N Jhanjhi, S Kok - PeerJ Computer Science, 2021 - peerj.com
Abstract The Industrial Revolution 4.0 began with the breakthrough technological advances
in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from …

Managing employee compliance with information security policies: The critical role of top management and organizational culture

Q Hu, T Dinev, P Hart, D Cooke - Decision Sciences, 2012 - Wiley Online Library
We develop an individual behavioral model that integrates the role of top management and
organizational culture into the theory of planned behavior in an attempt to better understand …

The science of guessing: analyzing an anonymized corpus of 70 million passwords

J Bonneau - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
We report on the largest corpus of user-chosen passwords ever studied, consisting of
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …

A comprehensive measurement study of domain generating malware

D Plohmann, K Yakdan, M Klatt, J Bader… - 25th USENIX Security …, 2016 - usenix.org
Recent years have seen extensive adoption of domain generation algorithms (DGA) by
modern botnets. The main goal is to generate a large number of domain names and then …

Predicting domain generation algorithms with long short-term memory networks

J Woodbridge, HS Anderson, A Ahuja… - arxiv preprint arxiv …, 2016 - arxiv.org
Various families of malware use domain generation algorithms (DGAs) to generate a large
number of pseudo-random domain names to connect to a command and control (C&C) …