[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

T Sasi, AH Lashkari, R Lu, P **ong, S Iqbal - Journal of Information and …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has set the way for the continuing digitalization of
society in various manners during the past decade. The IoT is a vast network of intelligent …

Cybersecurity threats in FinTech: A systematic review

D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2024 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …

An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques

T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework

M Al Razib, D Javeed, MT Khan, R Alkanhel… - IEEE …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is an instantly exacerbated communication technology that is
manifesting miraculous effectuation to revolutionize conventional means of network …

A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

[HTML][HTML] API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques

P Maniriho, AN Mahmood, MJM Chowdhury - Journal of Network and …, 2023 - Elsevier
This paper presents API-MalDetect, a new deep learning-based automated framework for
detecting malware attacks in Windows systems. The framework uses an NLP-based encoder …

A survey of large language models for cyber threat detection

Y Chen, M Cui, D Wang, Y Cao, P Yang, B Jiang… - Computers & …, 2024 - Elsevier
With the increasing complexity of cyber threats and the expanding scope of cyberspace,
there exist progressively more challenges in cyber threat detection. It's proven that most …

[HTML][HTML] Insider threat mitigation: Systematic literature review

U Inayat, M Farzan, S Mahmood, MF Zia… - Ain Shams Engineering …, 2024 - Elsevier
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …

IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System

EU Omede, AE Edje, MI Akazue… - Journal of …, 2024 - dl.futuretechsci.org
Burglary involves forced or unauthorized entry, which leads to damage or loss of property
having monetary or emotional value and, more severely, puts lives at risk. The dire need for …