[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
internet. This booming in technology is bringing ease in our lifestyle and making formerly …
Malicious application detection in android—a systematic literature review
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …
gadgets became an essential necessity of day-to-day life. People are using new …
IoT malware detection architecture using a novel channel boosted and squeezed CNN
Interaction between devices, people, and the Internet has given birth to a new digital
communication model, the internet of things (IoT). The integration of smart devices to …
communication model, the internet of things (IoT). The integration of smart devices to …
[HTML][HTML] A new deep boosted CNN and ensemble learning based IoT malware detection
Security issues are threatened in various types of networks, especially in the Internet of
Things (IoT) environment that requires early detection. IoT is the network of real-time devices …
Things (IoT) environment that requires early detection. IoT is the network of real-time devices …
Automated malware detection in mobile app stores based on robust feature generation
M Alazab - Electronics, 2020 - mdpi.com
Many Internet of Things (IoT) services are currently tracked and regulated via mobile
devices, making them vulnerable to privacy attacks and exploitation by various malicious …
devices, making them vulnerable to privacy attacks and exploitation by various malicious …
MaliCage: A packed malware family classification framework based on DNN and GAN
X Gao, C Hu, C Shan, W Han - Journal of Information Security and …, 2022 - Elsevier
To evade security detection, hackers always add a deceptive packer outside of the original
malicious codes. The coexistence of original unpacked samples and packed samples of …
malicious codes. The coexistence of original unpacked samples and packed samples of …
Mitigating malicious adversaries evasion attacks in industrial internet of things
With advanced 5G/6G networks, data-driven interconnected devices will increase
exponentially. As a result, the Industrial Internet of Things (IIoT) requires data secure …
exponentially. As a result, the Industrial Internet of Things (IIoT) requires data secure …
Cyber attacks in the era of covid-19 and possible solution domains
IC Eian, LK Yong, MYX Li, YH Qi, Z Fatima - 2020 - preprints.org
In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially.
The number of people doing online activities such as e-learning, remote working, online …
The number of people doing online activities such as e-learning, remote working, online …
Down2Park: Finding New Ways to Park
The purpose of this article is to investigate the problems regarding the time spent in traffic
and the proper measures that can be taken to decrease the time spent in traffic. The report …
and the proper measures that can be taken to decrease the time spent in traffic. The report …
A secure hybrid deep learning technique for anomaly detection in iiot edge computing
The IIoT network involves smart sensors, actuators, and technologies extending IoT
capabilities across industrial sectors. With the rapid development in connected technology …
capabilities across industrial sectors. With the rapid development in connected technology …