Security in brain-computer interfaces: state-of-the-art, opportunities, and future challenges
Brain-Computer Interfaces (BCIs) have significantly improved the patients' quality of life by
restoring damaged hearing, sight, and movement capabilities. After evolving their …
restoring damaged hearing, sight, and movement capabilities. After evolving their …
[PDF][PDF] Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review.
Abstract Distributed Denial of Service (DDoS) attack imposes a severe threat to the
extensively used Internet based services like e-commerce, e-banking, transportation …
extensively used Internet based services like e-commerce, e-banking, transportation …
A hybrid intelligent approach to detect android botnet using smart self-adaptive learning-based PSO-SVM
In recent years, extensive research has been conducted in the field of detecting Android
botnet, but most of the approaches introduced can provide a good answer to a limited …
botnet, but most of the approaches introduced can provide a good answer to a limited …
A fully scalable big data framework for Botnet detection based on network traffic analysis
Many traditional Botnet detection methods have trouble scaling up to meet the needs of multi-
Gbps networks. This scalability challenge is not just limited to bottlenecks in the detection …
Gbps networks. This scalability challenge is not just limited to bottlenecks in the detection …
Network flow watermarking: A survey
A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …
network administration often takes advantage of TA for purposes such as security, intrusion …
Mobile botnet detection: a comprehensive survey
The number of people using mobile devices is increasing as mobile devices offer different
features and services. Many mobile users install various applications on their mobile …
features and services. Many mobile users install various applications on their mobile …
[HTML][HTML] Bot-DM: A dual-modal botnet detection method based on the combination of implicit semantic expression and graphical expression
G Wu, X Wang, Q Lu, H Zhang - Expert Systems with Applications, 2024 - Elsevier
A botnet is a group of hijacked devices that conduct various cyberattacks, which is one of the
most dangerous threats on the internet. Individuals or organizations can effectively detect …
most dangerous threats on the internet. Individuals or organizations can effectively detect …
Sustainable securing of medical cyber-physical systems for the healthcare of the future
Over the last years, solutions based on Information and Communications Technologies (ICT)
have opted for the deployment of eHealth services to provide a higher level of quality and …
have opted for the deployment of eHealth services to provide a higher level of quality and …
Botnet fingerprinting: A frequency distributions scheme for lightweight bot detection
Efficient bot detection is a crucial security matter and widely explored in the past years.
Recent approaches supplant flow-based detection techniques and exploit graph-based …
Recent approaches supplant flow-based detection techniques and exploit graph-based …
Dynamic reconfiguration in 5G mobile networks to proactively detect and mitigate botnets
Botnets are one of the most powerful cyberthreats affecting continuity and delivery of existing
network services. Detecting and mitigating attacks promoted by botnets become a greater …
network services. Detecting and mitigating attacks promoted by botnets become a greater …