Home Care Automation: Market Research, Industry Analysis, and Security Assessment

A Fayoumi, S Sobati-Moghadam… - 2023 International …, 2023 - ieeexplore.ieee.org
Due to the low availability of carers worldwide, technological means to meet the ever-
increasing demand for care services are increasingly necessary. This paper discusses how …

Secure and efficient firmware update for increasing IoT-enabled smart devices

CH Lu, CH Liu, ZH Chen - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
With the rapidly increasing number of Internet of Things (IoT) devices, various
interconnected devices have become targets of growing cyberattacks. Keeping the firmware …

Enhanced malware detection using deep learning with image processing techniques

DA Benny King, P Prabhath… - Advances in Science and …, 2023 - Trans Tech Publ
Cyber security is a major worry for anyone with an internet-connected gadget in today's ever-
changing environment. Cyber security has become a nightmare due to numerous issues …

A Cybersecurity Framework for Home Energy Management Systems using Artificial Intelligence

L Gunasekara, H Moraliyage, D De Silva… - 2023 IEEE 32nd …, 2023 - ieeexplore.ieee.org
Home Energy Management Systems (HEMS) have become a pivotal component of the
smart grid infrastructure as they facilitate energy exchange and trading. With the increasing …

A Comprehensive Survey on Malware Detection Techniques

YK Joshi, N Tiwari - Proceedings of the 5th International Conference on …, 2023 - dl.acm.org
Malware, malicious software designed to infiltrate and compromise computer systems,
poses an ever-growing threat in today's interconnected world. This comprehensive review …

[PDF][PDF] Uso de honeypots na detecção de rootkits de malware: proposta de uma agenda de pesquisa

LVA Ferreira, RR Nunes, DC Café… - Revista Ibérica de …, 2023 - researchgate.net
A evolução constante de rootkits os torna ameaças especialmente difíceis de detectar e
eliminar. O seu uso em campanhas de Advanced Persistent Threats (APT's) evidencia o …

A Machine Learning Approach for Energy-Efficient IoT Systems

MM Ismail - Full Length Article, 2023 - americaspg.com
The energy challenge in IoT refers to the significant energy consumption of IoT devices,
which can lead to sustainability issues, shorter battery life, and increased operating costs …

Behavioral fingerprinting to detect ransomware in resource-constrained devices

Abstract The Internet of Things (IoT), a network of interconnected devices, has grown and
gained traction over the last few years. This paradigm can impact our lives while also …

Detecting Ransomware Using Alignment of the Different Sections of the PE Header

F Manavi, ME Samie, A Hamzeh - 2023 - researchsquare.com
Ransomware is one of the most challenging types of malware that uses cryptology to attack
victims' computers. The attackers then demand ransom payments to recover encrypted …

Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques

RA Manzano Sanchez, K Naik, A Albasir… - … Threats: Research and …, 2023 - dl.acm.org
Detecting anomalous behavior on smartphones is challenging since malware evolution.
Other methodologies detect malicious behavior by analyzing static features of the …