A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice

J Yang, L Sun - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid development and wide application of the Internet of Things (IoT) and sensor
technologies have produced good opportunities for the development of IoT-based smart …

Recent developments in game-theory approaches for the detection and defense against advanced persistent threats (APTs): a systematic review

MNA Khalid, AA Al-Kadhimi, MM Singh - Mathematics, 2023 - mdpi.com
Cybersecurity has become a prominent issue in regard to ensuring information privacy and
integrity in the internet age particularly with the rise of interconnected devices. However …

Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective

M Park, H Oh, K Lee - Sensors, 2019 - mdpi.com
Internet-of-Things (IoT) is a technology that is extensively being used in various fields.
Companies like Samsung, LG, and Apple are launching home appliances that use IoT as a …

A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …

AA Al-Kadhimi, MM Singh, MNA Khalid - Applied Sciences, 2023 - mdpi.com
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …

Design and implementation of earthquake information publishing system based on mobile computing and machine learning technology in GIS

H Zhai, Y Wang - Journal of Interconnection Networks, 2022 - World Scientific
This paper proposes a semi-automatic method of geographic information linking based on
spatial relationships, entity names, entity categories and other features, combined with …

Holistic feistel authenticated learning-based authorization for protecting the internet of things from cyber attacks

R Rahim, M Ramachandran, P Jayachandran… - Wireless Personal …, 2022 - Springer
Abstract As Artificial Intelligence (AI) and the Internet of Things (IoT) applications become
more eminent, business and government organizations have started thinking aggressively …

[PDF][PDF] Permission extraction framework for android malware detection

A Ghasempour, NFM Sani, JA Ovye - International Journal of …, 2020 - researchgate.net
Nowadays, Android-based devices are more utilized than other Operating Systems based
devices. Statistics show that the market share for android on mobile devices in March 2018 …

A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model

DT Salim, MM Singh, P Keikhosrokiani - Heliyon, 2023 - cell.com
Advancements in computing technology and the growing number of devices (eg, computers,
mobile) connected to networks have contributed to an increase in the amount of data …

A novel trusted software base for commercial android devices using secure tf card

Y Zhou, B Zhao, Y An - Security and Communication Networks, 2022 - Wiley Online Library
With the help of edge computing, the Internet of Things (IoT) provides users with efficient
data transmission and processing capabilities. As a main control device of the IoT and the …

Development of a cyber-situational awareness model of risk maturity using fuzzy fmea

NA Chandra, AAP Ratna… - … International Workshop on …, 2020 - ieeexplore.ieee.org
This paper uses Endsley's situational awareness model as a starting point for creating a new
cyber-security awareness model for risk maturity. This is used to model the relationship …