Deep learning and big data technologies for IoT security

MA Amanullah, RAA Habeeb, FH Nasaruddin… - Computer …, 2020 - Elsevier
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …

Cyber security threats and vulnerabilities: a systematic map** study

M Humayun, M Niazi, NZ Jhanjhi, M Alshayeb… - Arabian Journal for …, 2020 - Springer
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

Cloud computing adoption framework: A security framework for business clouds

V Chang, YH Kuo, M Ramachandran - Future Generation Computer …, 2016 - Elsevier
This article presents a cloud computing adoption framework (CCAF) security suitable for
business clouds. CCAF multilayered security is based on the development and integration of …

A hitchhiker's guide to statistical tests for assessing randomized algorithms in software engineering

A Arcuri, L Briand - Software Testing, Verification and Reliability, 2014 - Wiley Online Library
Randomized algorithms are widely used to address many types of software engineering
problems, especially in the area of software verification and validation with a strong …

A practical guide for using statistical tests to assess randomized algorithms in software engineering

A Arcuri, L Briand - Proceedings of the 33rd international conference on …, 2011 - dl.acm.org
Randomized algorithms have been used to successfully address many different types of
software engineering problems. This type of algorithms employ a degree of randomness as …

Appintent: Analyzing sensitive data transmission in android for privacy leakage detection

Z Yang, M Yang, Y Zhang, G Gu, P Ning… - Proceedings of the 2013 …, 2013 - dl.acm.org
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …

Security testing: A survey

M Felderer, M Büchler, M Johns, AD Brucker… - Advances in …, 2016 - Elsevier
Identifying vulnerabilities and ensuring security functionality by security testing is a widely
applied measure to evaluate and improve the security of software. Due to the openness of …

A symbolic execution framework for javascript

P Saxena, D Akhawe, S Hanna, F Mao… - … IEEE Symposium on …, 2010 - ieeexplore.ieee.org
As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly
complex. However, few automated vulnerability analysis tools for JavaScript exist. In this …