[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Abstract The Internet of Things (IoT) has set the way for the continuing digitalization of
society in various manners during the past decade. The IoT is a vast network of intelligent …
society in various manners during the past decade. The IoT is a vast network of intelligent …
Cybersecurity threats in FinTech: A systematic review
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques
T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …
an organization. Insider threats represent a major cybersecurity challenge for private and …
A survey on threat hunting in enterprise networks
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework
Internet of Things (IoT) is an instantly exacerbated communication technology that is
manifesting miraculous effectuation to revolutionize conventional means of network …
manifesting miraculous effectuation to revolutionize conventional means of network …
A systematic review on machine learning and deep learning models for electronic information security in mobile networks
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …
tremendous volume of data being generated. Most of our information is part of a widespread …
[HTML][HTML] API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques
This paper presents API-MalDetect, a new deep learning-based automated framework for
detecting malware attacks in Windows systems. The framework uses an NLP-based encoder …
detecting malware attacks in Windows systems. The framework uses an NLP-based encoder …
A survey of large language models for cyber threat detection
With the increasing complexity of cyber threats and the expanding scope of cyberspace,
there exist progressively more challenges in cyber threat detection. It's proven that most …
there exist progressively more challenges in cyber threat detection. It's proven that most …
[HTML][HTML] Insider threat mitigation: Systematic literature review
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …
measures. The majority of these attacks are initiated by authorized users who possess …
IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System
Burglary involves forced or unauthorized entry, which leads to damage or loss of property
having monetary or emotional value and, more severely, puts lives at risk. The dire need for …
having monetary or emotional value and, more severely, puts lives at risk. The dire need for …