The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks

M Shafiq, Z Gu, O Cheikhrouhou… - Wireless …, 2022‏ - Wiley Online Library
This paper provides an extensive and complete survey on the process of detecting and
preventing various types of IoT‐based security attacks. It is designed for software …

Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019‏ - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

Cloud computing security: A survey of service-based models

FK Parast, C Sindhav, S Nikam, HI Yekta, KB Kent… - Computers & …, 2022‏ - Elsevier
Cloud computing has recently attracted significant attention due to its economical and high-
quality services. In the last decade, cloud services have inevitably entangled with …

A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018‏ - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …

Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022‏ - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure

Y Baseri, V Chouhan, A Ghorbani - arxiv preprint arxiv:2404.10659, 2024‏ - arxiv.org
The emergence of quantum computing presents a double-edged sword for cybersecurity.
While its immense power holds promise for advancements in various fields, it also threatens …

Nights-watch: A cache-based side-channel intrusion detector using hardware performance counters

M Mushtaq, A Akram, MK Bhatti, M Chaudhry… - Proceedings of the 7th …, 2018‏ - dl.acm.org
This paper presents a novel run-time detection mechanism, called NIGHTs-WATCH, for
access-driven cache-based Side-Channel Attacks (SCAs). It comprises of multiple machine …

A survey on the security of cloud computing

L Alhenaki, A Alwatban, B Alamri… - 2019 2nd international …, 2019‏ - ieeexplore.ieee.org
Within the recent decade, major innovations in technology have emerged, that potentially
add more convenience to daily life practices not only on an enterprise level but on an …

Energy-aware and multi-resource overload probability constraint-based virtual machine dynamic consolidation method

Z Li, C Yan, L Yu, X Yu - Future Generation Computer Systems, 2018‏ - Elsevier
In a data center, virtual machine consolidation has been proposed to improve the resource
utilization and energy efficiency. An effective and efficient virtual machine consolidation …

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti… - Information Systems, 2020‏ - Elsevier
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …