Evolving Access Control Paradigms: A Comprehensive Multi-Dimensional Analysis of Security Risks and System Assurance in Cyber Engineering

NR Mayeke, AT Arigbabu, OO Olaniyi… - Available at …, 2024 - papers.ssrn.com
This study evaluates the effectiveness of traditional access control paradigms—Role-Based
Access Control (RBAC), Policy-Based Access Control (PBAC), and Attribute-Based Access …

An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles

NW Hundera, MU Aftab, D Mesfin, F Dioubi, H Xu… - Vehicular …, 2024 - Elsevier
Abstract In the Internet of Vehicles (IoV) domain, the collection of traffic data is executed by
intelligent devices and stored within a cloud-assisted IoV system. However, ensuring …

[HTML][HTML] Sixth-Generation (6G) Networks for Improved Machine-to-Machine (M2M) Communication in Industry 4.0

I Rojek, P Kotlarz, J Dorożyński, D Mikołajewski - Electronics, 2024 - mdpi.com
The sixth generation of mobile networks (6G) has the potential to revolutionize the way we
communicate, interact, and use information for machine-to-machine (M2M) communication …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

[HTML][HTML] Mitigating Adversarial Attacks against IoT Profiling

ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux - Electronics, 2024 - mdpi.com
Internet of Things (IoT) applications have been helping society in several ways. However,
challenges still must be faced to enable efficient and secure IoT operations. In this context …

Examining windows file system irp operations with machine learning for ransomware detection

B Xu, S Wang - 2024 - researchsquare.com
This study introduces an innovative approach to ransomware detection on Windows
operating systems by leveraging Generative Adversarial Networks (GANs) to analyze file …

A SURVEY OF THE CURRENT AND EMERGING RANSOMWARE THREAT LANDSCAPE

JLJ Worrell - EDPACS, 2024 - Taylor & Francis
Ransomware attacks have become more prevalent, sophisticated, and organized.
Ransomware is a catch-all term associated with revenue-generating malicious software that …

Ransomware Threats in Industrial Internet of Things Networks: A Detection Approach

A Aziz, S Mirzaliev - Full Length Article, 2024 - americaspg.com
Abstract The Industrial Internet of Things (IIoT) is a challenging environment for ransomware
threats, and it requires robust detection mechanisms to protect critical infrastructures. This …

Enhancing Network Security: A Comprehensive Review of Modern Threats and Countermeasures

N Kanwal - International Journal of Advanced Sciences and …, 2024 - ijasc.com
This paper conducts a thorough review contemporary network security threats and the
corresponding countermeasures aimed at fortifying digital infrastructures. In today's …

Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions

W Owoko - World Journal of Advanced Engineering Technology …, 2024 - wjaets.com
The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats
from evolving attack vectors targeting its headers. This survey explores emerging trends in …