[HTML][HTML] Fake news outbreak 2021: Can we stop the viral spread?
Social Networks' omnipresence and ease of use has revolutionized the generation and
distribution of information in today's world. However, easy access to information does not …
distribution of information in today's world. However, easy access to information does not …
Understanding the mirai botnet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
storm in late 2016 when it overwhelmed several high-profile targets with massive distributed …
Securing internet of medical things systems: Limitations, issues and recommendations
Traditional health-care systems suffer from new challenges associated with the constant
increase in the number of patients. In order to address this issue, and to increase the …
increase in the number of patients. In order to address this issue, and to increase the …
[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
[PDF][PDF] Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
Abstract The Industrial Revolution 4.0 began with the breakthrough technological advances
in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from …
in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from …
Managing employee compliance with information security policies: The critical role of top management and organizational culture
We develop an individual behavioral model that integrates the role of top management and
organizational culture into the theory of planned behavior in an attempt to better understand …
organizational culture into the theory of planned behavior in an attempt to better understand …
The science of guessing: analyzing an anonymized corpus of 70 million passwords
J Bonneau - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
We report on the largest corpus of user-chosen passwords ever studied, consisting of
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …
A comprehensive measurement study of domain generating malware
Recent years have seen extensive adoption of domain generation algorithms (DGA) by
modern botnets. The main goal is to generate a large number of domain names and then …
modern botnets. The main goal is to generate a large number of domain names and then …
Predicting domain generation algorithms with long short-term memory networks
Various families of malware use domain generation algorithms (DGAs) to generate a large
number of pseudo-random domain names to connect to a command and control (C&C) …
number of pseudo-random domain names to connect to a command and control (C&C) …