Home Care Automation: Market Research, Industry Analysis, and Security Assessment
A Fayoumi, S Sobati-Moghadam… - 2023 International …, 2023 - ieeexplore.ieee.org
Due to the low availability of carers worldwide, technological means to meet the ever-
increasing demand for care services are increasingly necessary. This paper discusses how …
increasing demand for care services are increasingly necessary. This paper discusses how …
Secure and efficient firmware update for increasing IoT-enabled smart devices
CH Lu, CH Liu, ZH Chen - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
With the rapidly increasing number of Internet of Things (IoT) devices, various
interconnected devices have become targets of growing cyberattacks. Keeping the firmware …
interconnected devices have become targets of growing cyberattacks. Keeping the firmware …
Enhanced malware detection using deep learning with image processing techniques
DA Benny King, P Prabhath… - Advances in Science and …, 2023 - Trans Tech Publ
Cyber security is a major worry for anyone with an internet-connected gadget in today's ever-
changing environment. Cyber security has become a nightmare due to numerous issues …
changing environment. Cyber security has become a nightmare due to numerous issues …
A Cybersecurity Framework for Home Energy Management Systems using Artificial Intelligence
Home Energy Management Systems (HEMS) have become a pivotal component of the
smart grid infrastructure as they facilitate energy exchange and trading. With the increasing …
smart grid infrastructure as they facilitate energy exchange and trading. With the increasing …
A Comprehensive Survey on Malware Detection Techniques
YK Joshi, N Tiwari - Proceedings of the 5th International Conference on …, 2023 - dl.acm.org
Malware, malicious software designed to infiltrate and compromise computer systems,
poses an ever-growing threat in today's interconnected world. This comprehensive review …
poses an ever-growing threat in today's interconnected world. This comprehensive review …
[PDF][PDF] Uso de honeypots na detecção de rootkits de malware: proposta de uma agenda de pesquisa
LVA Ferreira, RR Nunes, DC Café… - Revista Ibérica de …, 2023 - researchgate.net
A evolução constante de rootkits os torna ameaças especialmente difíceis de detectar e
eliminar. O seu uso em campanhas de Advanced Persistent Threats (APT's) evidencia o …
eliminar. O seu uso em campanhas de Advanced Persistent Threats (APT's) evidencia o …
A Machine Learning Approach for Energy-Efficient IoT Systems
MM Ismail - Full Length Article, 2023 - americaspg.com
The energy challenge in IoT refers to the significant energy consumption of IoT devices,
which can lead to sustainability issues, shorter battery life, and increased operating costs …
which can lead to sustainability issues, shorter battery life, and increased operating costs …
Behavioral fingerprinting to detect ransomware in resource-constrained devices
A Huertas Celdrán, PM Sánchez Sánchez… - 2023 - dl.acm.org
Abstract The Internet of Things (IoT), a network of interconnected devices, has grown and
gained traction over the last few years. This paradigm can impact our lives while also …
gained traction over the last few years. This paradigm can impact our lives while also …
Detecting Ransomware Using Alignment of the Different Sections of the PE Header
Ransomware is one of the most challenging types of malware that uses cryptology to attack
victims' computers. The attackers then demand ransom payments to recover encrypted …
victims' computers. The attackers then demand ransom payments to recover encrypted …
Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques
Detecting anomalous behavior on smartphones is challenging since malware evolution.
Other methodologies detect malicious behavior by analyzing static features of the …
Other methodologies detect malicious behavior by analyzing static features of the …