IoT security: Review, blockchain solutions, and open challenges
MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
The rise of social bots
The rise of social bots Page 1 96 COMMUNICATIONS OF THE ACM | JULY 2016 | VOL. 59 |
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …
A survey on internet of things security: Requirements, challenges, and solutions
Abstract Internet of Things (IoT) is one of the most promising technologies that aims to
enhance humans' quality of life (QoL). IoT plays a significant role in several fields such as …
enhance humans' quality of life (QoL). IoT plays a significant role in several fields such as …
Online human-bot interactions: Detection, estimation, and characterization
Increasing evidence suggests that a growing amount of social media content is generated
by autonomous entities known as social bots. In this work we present a framework to detect …
by autonomous entities known as social bots. In this work we present a framework to detect …
Deep neural networks for bot detection
The problem of detecting bots, automated social media accounts governed by software but
disguising as human users, has strong implications. For example, bots have been used to …
disguising as human users, has strong implications. For example, bots have been used to …
SoK: Consensus in the age of blockchains
The core technical component of blockchains is consensus: how to reach agreement among
a distributed network of nodes. A plethora of blockchain consensus protocols have been …
a distributed network of nodes. A plethora of blockchain consensus protocols have been …
Advanced social engineering attacks
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …
effective means to attack information systems. The services used by today's knowledge …
Prio: Private, robust, and scalable computation of aggregate statistics
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
Artificial intelligence crime: An interdisciplinary analysis of foreseeable threats and solutions
Artificial intelligence (AI) research and regulation seek to balance the benefits of innovation
against any potential harms and disruption. However, one unintended consequence of the …
against any potential harms and disruption. However, one unintended consequence of the …
Unpacking the social media bot: A typology to guide research and policy
Amid widespread reports of digital influence operations during major elections,
policymakers, scholars, and journalists have become increasingly interested in the political …
policymakers, scholars, and journalists have become increasingly interested in the political …