The security of big data in fog-enabled IoT applications including blockchain: A survey

N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi… - Sensors, 2019 - mdpi.com
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …

Detection of advanced persistent threat using machine-learning correlation analysis

I Ghafir, M Hammoudeh, V Prenosil, L Han… - Future Generation …, 2018 - Elsevier
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have
caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with …

Systematic literature review on the state of the art and future research work in anonymous communications systems

MA Nia, A Ruiz-Martinez - Computers & electrical engineering, 2018 - Elsevier
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. During …

Hidden Markov models and alert correlations for the prediction of advanced persistent threats

I Ghafir, KG Kyriakopoulos, S Lambotharan… - IEEE …, 2019 - ieeexplore.ieee.org
Cyber security has become a matter of a global interest, and several attacks target industrial
companies and governmental organizations. The advanced persistent threats (APTs) have …

Botdet: A system for real time botnet command and control traffic detection

I Ghafir, V Prenosil, M Hammoudeh, T Baker… - IEEE …, 2018 - ieeexplore.ieee.org
Over the past decade, the digitization of services transformed the healthcare sector leading
to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled …

A new hybrid machine learning for cybersecurity threat detection based on adaptive boosting

P Sornsuwit, S Jaiyen - Applied Artificial Intelligence, 2019 - Taylor & Francis
ABSTRACT A hybrid machine learning is a combination of multiple types of machine
learning algorithms for improving the performance of single classifiers. Currently, cyber …

Machine learning approach for detection of nontor traffic

E Hodo, X Bellekens, E Iorkyase, A Hamilton… - Proceedings of the 12th …, 2017 - dl.acm.org
Intrusion detection has attracted a considerable interest from researchers and industries.
After many years of research the community still faces the problem of building reliable and …

Anomaly detection using dynamic time war**

DM Diab, B AsSadhan, H Binsalleeh… - … (CSE) and IEEE …, 2019 - ieeexplore.ieee.org
Analyzing network traffic behavior is essential for detecting network anomalies. However, it
remains a challenge to effectively analyze this behavior for anomaly diagnosis. One …

Malicious ssl certificate detection: A step towards advanced persistent threat defence

I Ghafir, V Prenosil, M Hammoudeh, L Han… - Proceedings of the …, 2017 - dl.acm.org
Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is
a new and more complex version of multistep attack. Within the APT life cycle, continuous …

Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat

I Ghafir, V Prenosil, M Hammoudeh… - Proceedings of the 2nd …, 2018 - dl.acm.org
In recent years, cyber attacks have caused substantial financial losses and been able to stop
fundamental public services. Among the serious attacks, Advanced Persistent Threat (APT) …