Task scheduling in fog environment—Challenges, tools & methodologies: A review

ZJK Abadi, N Mansouri, M Khalouie - Computer Science Review, 2023 - Elsevier
Even though cloud computing offers many advantages, it can be a poor choice sometimes
because of its slow response to existing requests, leading to the need for fog computing …

User behavior analysis for detecting compromised user Accounts: A review paper

M Jurišić, I Tomičić, P Grd - Cybernetics and Information Technologies, 2023 - sciendo.com
The rise of online transactions has led to a corresponding increase in online criminal
activities. Account takeover attacks, in particular, are challenging to detect, and novel …

[HTML][HTML] A Petri Net and LSTM Hybrid Approach for Intrusion Detection Systems in Enterprise Networks

G Volpe, M Fiore, A la Grasta, F Albano… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
Intrusion Detection Systems (IDSs) are a crucial component of modern corporate firewalls.
The ability of IDS to identify malicious traffic is a powerful tool to prevent potential attacks …

Detecting anomalies in industrial control systems with lstm neural networks and ueba

C Piñón-Blanco, F Otero-Vázquez… - 2023 JNIC …, 2023 - ieeexplore.ieee.org
The increasing adoption of the Industrial Internet of Things and integration of operational
technology with information technology networks have made industrial control systems (ICS) …

[HTML][HTML] Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques

Y Ko, IWAJ Pawana, I You - Sensors (Basel, Switzerland), 2024 - pmc.ncbi.nlm.nih.gov
The 5G-AKA protocol, a foundational component for 5G network authentication, has been
found vulnerable to various security threats, including linkability attacks that compromise …

Task scheduling in fog environment—Challenges, tools & methodologies:: A review

Z Jalali Khalil Abadi, N Mansouri, M Khalouie - 2023 - dl.acm.org
Even though cloud computing offers many advantages, it can be a poor choice sometimes
because of its slow response to existing requests, leading to the need for fog computing …

[引用][C] Detection and Classification of Cybersecurity User/Entity Behaviour Anomalies on Web events

JPS Neves - 2024