IoT security: Review, blockchain solutions, and open challenges

MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …

The rise of social bots

E Ferrara, O Varol, C Davis, F Menczer… - Communications of the …, 2016 - dl.acm.org
The rise of social bots Page 1 96 COMMUNICATIONS OF THE ACM | JULY 2016 | VOL. 59 |
NO. 7 review articles ILL US TRA TION B Y ARN0 DOI:10.1145/2818717 Today’s social bots …

A survey on internet of things security: Requirements, challenges, and solutions

H HaddadPajouh, A Dehghantanha, RM Parizi… - Internet of Things, 2021 - Elsevier
Abstract Internet of Things (IoT) is one of the most promising technologies that aims to
enhance humans' quality of life (QoL). IoT plays a significant role in several fields such as …

Online human-bot interactions: Detection, estimation, and characterization

O Varol, E Ferrara, C Davis, F Menczer… - Proceedings of the …, 2017 - ojs.aaai.org
Increasing evidence suggests that a growing amount of social media content is generated
by autonomous entities known as social bots. In this work we present a framework to detect …

Deep neural networks for bot detection

S Kudugunta, E Ferrara - Information Sciences, 2018 - Elsevier
The problem of detecting bots, automated social media accounts governed by software but
disguising as human users, has strong implications. For example, bots have been used to …

SoK: Consensus in the age of blockchains

S Bano, A Sonnino, M Al-Bassam, S Azouvi… - Proceedings of the 1st …, 2019 - dl.acm.org
The core technical component of blockchains is consensus: how to reach agreement among
a distributed network of nodes. A plethora of blockchain consensus protocols have been …

Advanced social engineering attacks

K Krombholz, H Hobel, M Huber, E Weippl - Journal of Information Security …, 2015 - Elsevier
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …

Prio: Private, robust, and scalable computation of aggregate statistics

H Corrigan-Gibbs, D Boneh - 14th USENIX symposium on networked …, 2017 - usenix.org
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …

Artificial intelligence crime: An interdisciplinary analysis of foreseeable threats and solutions

TC King, N Aggarwal, M Taddeo, L Floridi - Science and engineering …, 2020 - Springer
Artificial intelligence (AI) research and regulation seek to balance the benefits of innovation
against any potential harms and disruption. However, one unintended consequence of the …

Unpacking the social media bot: A typology to guide research and policy

R Gorwa, D Guilbeault - Policy & Internet, 2020 - Wiley Online Library
Amid widespread reports of digital influence operations during major elections,
policymakers, scholars, and journalists have become increasingly interested in the political …