Semi-supervised based unknown attack detection in EDR environment

C Hwang, D Kim, T Lee - … on Internet and Information Systems (TIIS …, 2020 - koreascience.kr
Cyberattacks penetrate the server and perform various malicious acts such as stealing
confidential information, destroying systems, and exposing personal information. To achieve …

Digital certificate-based port knocking for connected embedded systems

B Mahbooba, M Schukat - 2017 28th Irish Signals and Systems …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is more vulnerable to targeted cyber-attacks than an ordinary
Information Technology (IT) infrastructure, where these cyber-attacks operate on subsequent …

Design of anomaly detection system based on Big Data in Internet of Things

SI Na, HJ Kim - J. Digit. Contents Soc, 2018 - dbpia.co.kr
Internet of Things (IoT) is producing various data as the smart environment comes. The IoT
data collection is used as important data to judge systems's status. Therefore, it is important …

Challenges and issues of the Internet of Things: factoring elements from the social, political and information systems

A Ali, W Hussian - International Conference on Internet of Things as a …, 2021 - Springer
The concept and applications of the Internet of Things or IoT are well-known to those dealing
with the technicalities and complexities of IoT. However, for most users, the understanding …

[PDF][PDF] A countermeasure against spoofing and DoS attacks based on message sequence and temporary ID in CAN

S Ahn, H Kim, J Jeong, K Kim - 2016 Symposium on …, 2016 - koasas.kaist.ac.kr
The development of Information and Communications Technologies (ICT) has affected
various fields including the automotive industry. Therefore, vehicle network protocols such …