Evolving Access Control Paradigms: A Comprehensive Multi-Dimensional Analysis of Security Risks and System Assurance in Cyber Engineering
NR Mayeke, AT Arigbabu, OO Olaniyi… - Available at …, 2024 - papers.ssrn.com
This study evaluates the effectiveness of traditional access control paradigms—Role-Based
Access Control (RBAC), Policy-Based Access Control (PBAC), and Attribute-Based Access …
Access Control (RBAC), Policy-Based Access Control (PBAC), and Attribute-Based Access …
An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles
NW Hundera, MU Aftab, D Mesfin, F Dioubi, H Xu… - Vehicular …, 2024 - Elsevier
Abstract In the Internet of Vehicles (IoV) domain, the collection of traffic data is executed by
intelligent devices and stored within a cloud-assisted IoV system. However, ensuring …
intelligent devices and stored within a cloud-assisted IoV system. However, ensuring …
[HTML][HTML] Sixth-Generation (6G) Networks for Improved Machine-to-Machine (M2M) Communication in Industry 4.0
I Rojek, P Kotlarz, J Dorożyński, D Mikołajewski - Electronics, 2024 - mdpi.com
The sixth generation of mobile networks (6G) has the potential to revolutionize the way we
communicate, interact, and use information for machine-to-machine (M2M) communication …
communicate, interact, and use information for machine-to-machine (M2M) communication …
Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence
SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …
[HTML][HTML] Mitigating Adversarial Attacks against IoT Profiling
Internet of Things (IoT) applications have been helping society in several ways. However,
challenges still must be faced to enable efficient and secure IoT operations. In this context …
challenges still must be faced to enable efficient and secure IoT operations. In this context …
Examining windows file system irp operations with machine learning for ransomware detection
B Xu, S Wang - 2024 - researchsquare.com
This study introduces an innovative approach to ransomware detection on Windows
operating systems by leveraging Generative Adversarial Networks (GANs) to analyze file …
operating systems by leveraging Generative Adversarial Networks (GANs) to analyze file …
A SURVEY OF THE CURRENT AND EMERGING RANSOMWARE THREAT LANDSCAPE
JLJ Worrell - EDPACS, 2024 - Taylor & Francis
Ransomware attacks have become more prevalent, sophisticated, and organized.
Ransomware is a catch-all term associated with revenue-generating malicious software that …
Ransomware is a catch-all term associated with revenue-generating malicious software that …
Ransomware Threats in Industrial Internet of Things Networks: A Detection Approach
A Aziz, S Mirzaliev - Full Length Article, 2024 - americaspg.com
Abstract The Industrial Internet of Things (IIoT) is a challenging environment for ransomware
threats, and it requires robust detection mechanisms to protect critical infrastructures. This …
threats, and it requires robust detection mechanisms to protect critical infrastructures. This …
Enhancing Network Security: A Comprehensive Review of Modern Threats and Countermeasures
N Kanwal - International Journal of Advanced Sciences and …, 2024 - ijasc.com
This paper conducts a thorough review contemporary network security threats and the
corresponding countermeasures aimed at fortifying digital infrastructures. In today's …
corresponding countermeasures aimed at fortifying digital infrastructures. In today's …
Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions
W Owoko - World Journal of Advanced Engineering Technology …, 2024 - wjaets.com
The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats
from evolving attack vectors targeting its headers. This survey explores emerging trends in …
from evolving attack vectors targeting its headers. This survey explores emerging trends in …