A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice
The rapid development and wide application of the Internet of Things (IoT) and sensor
technologies have produced good opportunities for the development of IoT-based smart …
technologies have produced good opportunities for the development of IoT-based smart …
Recent developments in game-theory approaches for the detection and defense against advanced persistent threats (APTs): a systematic review
Cybersecurity has become a prominent issue in regard to ensuring information privacy and
integrity in the internet age particularly with the rise of interconnected devices. However …
integrity in the internet age particularly with the rise of interconnected devices. However …
Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective
Internet-of-Things (IoT) is a technology that is extensively being used in various fields.
Companies like Samsung, LG, and Apple are launching home appliances that use IoT as a …
Companies like Samsung, LG, and Apple are launching home appliances that use IoT as a …
A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …
organized and skilled adversary to remain undetected while systematically and continuously …
Design and implementation of earthquake information publishing system based on mobile computing and machine learning technology in GIS
H Zhai, Y Wang - Journal of Interconnection Networks, 2022 - World Scientific
This paper proposes a semi-automatic method of geographic information linking based on
spatial relationships, entity names, entity categories and other features, combined with …
spatial relationships, entity names, entity categories and other features, combined with …
Holistic feistel authenticated learning-based authorization for protecting the internet of things from cyber attacks
Abstract As Artificial Intelligence (AI) and the Internet of Things (IoT) applications become
more eminent, business and government organizations have started thinking aggressively …
more eminent, business and government organizations have started thinking aggressively …
[PDF][PDF] Permission extraction framework for android malware detection
Nowadays, Android-based devices are more utilized than other Operating Systems based
devices. Statistics show that the market share for android on mobile devices in March 2018 …
devices. Statistics show that the market share for android on mobile devices in March 2018 …
A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model
Advancements in computing technology and the growing number of devices (eg, computers,
mobile) connected to networks have contributed to an increase in the amount of data …
mobile) connected to networks have contributed to an increase in the amount of data …
A novel trusted software base for commercial android devices using secure tf card
Y Zhou, B Zhao, Y An - Security and Communication Networks, 2022 - Wiley Online Library
With the help of edge computing, the Internet of Things (IoT) provides users with efficient
data transmission and processing capabilities. As a main control device of the IoT and the …
data transmission and processing capabilities. As a main control device of the IoT and the …
Development of a cyber-situational awareness model of risk maturity using fuzzy fmea
This paper uses Endsley's situational awareness model as a starting point for creating a new
cyber-security awareness model for risk maturity. This is used to model the relationship …
cyber-security awareness model for risk maturity. This is used to model the relationship …