A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

A review of recent approaches on wrapper feature selection for intrusion detection

J Maldonado, MC Riff, B Neveu - Expert Systems with Applications, 2022 - Elsevier
In this paper, we present a review of recent advances in wrapper feature selection
techniques for attack detection and classification, applied in intrusion detection area. Due to …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking

A Amarudin, F Ulum - Jurnal Teknoinfo, 2018 - ejurnal.teknokrat.ac.id
Keamanan jaringan merupakan salah satu hal terpenting dalam implementasi jaringan
komputer. Tidak sedikit jaringan komputer yang mengalami masalah yang disebabkan oleh …

Network intrusion detection system using deep learning

L Ashiku, C Dagli - Procedia Computer Science, 2021 - Elsevier
The widespread use of interconnectivity and interoperability of computing systems have
become an indispensable necessity to enhance our daily activities. Simultaneously, it opens …

A digital twin based industrial automation and control system security architecture

C Gehrmann, M Gunnarsson - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
The digital twin is a rather new industrial control and automation systems concept. While the
approach so far has gained interest mainly due to capabilities to make advanced …

Cyber and physical security vulnerability assessment for IoT-based smart homes

B Ali, AI Awad - sensors, 2018 - mdpi.com
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices,
objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated …

A review of edge computing reference architectures and a new global edge proposal

I Sittón-Candanedo, RS Alonso, JM Corchado… - Future Generation …, 2019 - Elsevier
Edge Computing represents the activities of IoT (Internet of Things) devices at the border or
limit of the network connected to the remote Cloud. The latest research in this field has …

Vehicular edge computing: Architecture, resource management, security, and challenges

R Meneguette, R De Grande, J Ueyama… - ACM Computing …, 2021 - dl.acm.org
Vehicular Edge Computing (VEC), based on the Edge Computing motivation and
fundamentals, is a promising technology supporting Intelligent Transport Systems services …