[Retracted] EEG‐Based Epileptic Seizure Detection via Machine/Deep Learning Approaches: A Systematic Review

I Ahmad, X Wang, M Zhu, C Wang, Y Pi… - Computational …, 2022 - Wiley Online Library
Epileptic seizure is one of the most chronic neurological diseases that instantaneously
disrupts the lifestyle of affected individuals. Toward develo** novel and efficient …

[HTML][HTML] Detection of distributed denial of service (DDoS) attacks in IOT based monitoring system of banking sector using machine learning models

U Islam, A Muhammad, R Mansoor, MS Hossain… - Sustainability, 2022 - mdpi.com
Cyberattacks can trigger power outages, military equipment problems, and breaches of
confidential information, ie, medical records could be stolen if they get into the wrong hands …

[HTML][HTML] Smart android based home automation system using internet of things (IoT)

MA Khan, I Ahmad, AN Nordin, AES Ahmed… - Sustainability, 2022 - mdpi.com
Recently, home automation system has getting significant attention because of the fast and
advanced technology, making daily living more convenient. Almost everything has been …

[PDF][PDF] Man in the middle attacks: Analysis, motivation and prevention

D Javeed, U MohammedBadamasi… - International Journal of …, 2020 - academia.edu
Computer systems and applications are improving day by day and with the advancement in
such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of …

[HTML][HTML] Bth: Behavior-based structured threat hunting framework to analyze and detect advanced adversaries

A Bhardwaj, K Kaushik, A Alomari, A Alsirhani… - Electronics, 2022 - mdpi.com
Organizations of every size and industry are facing a new normal. Adversaries have become
more sophisticated and persistent than ever before. Every network is facing never-ending …

Cyber attacks detection through machine learning in banking

MA Gill, N Ahmad, M Khan, F Asghar… - Bulletin of Business …, 2023 - bbejournal.com
Cyberattacks may cause a wide range of problems, from power outages to broken military
equipment to the loss of vital information like patient medical records. Due to the huge …

[PDF][PDF] Cyber Threat Hunting Case Study using MISP.

M Ammi, YM Jama - J. Internet Serv. Inf. Secur., 2023 - jisis.org
The growing frequency of cyberattacks invokes the need to develop and implement more
efficient security strategies. Traditional preventive security measures are not able to counter …

[PDF][PDF] A deep learning based approach for DDoS attack detection in IoT-enabled smart environments

UM Badamasi, S Khaliq, O Babalola… - … Journal of Computer …, 2020 - researchgate.net
This research contributes to enhance the security of smart environments such as Internet-of-
Things (IoT) network. IoT provides a big network to connect things around the world in …

A new approach for detecting process injection attacks using memory analysis

M Nasereddin, R Al-Qassas - International Journal of Information Security, 2024 - Springer
This paper introduces a new approach for examining and analyzing fileless malware
artifacts in computer memory. The proposed approach offers the distinct advantage of …

Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI

C Hillier, T Karroubi - arxiv preprint arxiv:2204.11076, 2022 - arxiv.org
The threat hunting lifecycle is a complex atmosphere that requires special attention from
professionals to maintain security. This paper is a collection of recent work that gives a …