A survey on conflict detection in iot-based smart homes
As the adoption of IoT-based smart homes continues to grow, the importance of addressing
potential conflicts becomes increasingly vital for ensuring seamless functionality and user …
potential conflicts becomes increasingly vital for ensuring seamless functionality and user …
Deep learning methods for malware and intrusion detection: A systematic literature review
Android and Windows are the predominant operating systems used in mobile environment
and personal computers and it is expected that their use will rise during the next decade …
and personal computers and it is expected that their use will rise during the next decade …
A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …
network communication technology to establish ubiquitous connectivity among people …
DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic
Malware detection has recently emerged as a significant challenge on the Internet of Things
(IoT) security domain. Due to the increasing complexity and variety of malware, the demand …
(IoT) security domain. Due to the increasing complexity and variety of malware, the demand …
[HTML][HTML] Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
The exponential growth of the Internet of Things (IoT) sector has resulted in a surge of
interconnected gadgets in smart households, thus exposing them to new cyber-attack …
interconnected gadgets in smart households, thus exposing them to new cyber-attack …
Towards Secure and Reliable IoT Systems: A Comprehensive Review of Formal Methods Applications
The exponential growth of Internet of Things (IoT) applications poses substantial obstacles
in guaranteeing their dependability, safety, and effectiveness. Formal methods provide …
in guaranteeing their dependability, safety, and effectiveness. Formal methods provide …
Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network
Traditional network administration required manual programming of routing policies and
related parameters on specific routers and switches, which was expensive. Therefore …
related parameters on specific routers and switches, which was expensive. Therefore …
[PDF][PDF] An Evaluation of Current Malware Trends and Defense Techniques: A Sco** Review with Empirical Case Studies
A Cletus, AA Opoku, BA Weyori - Journal of Advances in Information …, 2024 - jait.us
1 Department of Computer Science and Informatics, University of Energy and Natural
Resources, Sunyani, Ghana 2 Department of Mathematics and ICT, St. John Boscos College …
Resources, Sunyani, Ghana 2 Department of Mathematics and ICT, St. John Boscos College …
Correctness of IoT-based systems: From a DSL to a mechanised analysis
Abstract Systems based on the Internet of Things are being widely used in industrial areas
such as smart manufacturing, in smart health monitoring, in entertainment and in home …
such as smart manufacturing, in smart health monitoring, in entertainment and in home …
Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
This article discusses the importance of cross-platform UX/UI designs and frameworks and
their effectiveness in building web applications and websites. Third-party libraries (TPL) and …
their effectiveness in building web applications and websites. Third-party libraries (TPL) and …