Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination

Y Shen, S Shen, Z Wu, H Zhou, S Yu - Journal of Information Security and …, 2022 - Elsevier
IoT malware dissemination seriously exacerbates the decline of IoT system availability,
which deteriorates the users experience. To address the issue, we first predict the optimal …

A Tutorial-Cum-Survey on Percolation Theory With Applications in Large-Scale Wireless Networks

H ElSawy, A Zhaikhan, MA Kishk… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Connectivity is an important key performance indicator and a focal point of research in large-
scale wireless networks. Due to path-loss attenuation of electromagnetic waves, direct …

ECMT framework for internet of things: an integrative approach employing in-memory attribute examination and sophisticated neural network architectures in …

YA Abid, J Wu, M Farhan… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the proliferation of connected devices in the Internet of Things (IoT), cybersecurity
threats have increased. Identifying malicious attacks in IoT requires advanced techniques …

Modeling, Critical Threshold, and Lowest-Cost Patching Strategy of Malware Propagation in Heterogeneous IoT Networks

X Wang, X Zhang, S Wang, J Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In heterogeneous Internet of Things (IoT) networks, various communication technologies
lead to different transmission ranges of nodes, and they can cooperatively provide seamless …

Towards Secure IoT‐Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)

MNM Bhutta, S Bhattia, MA Alojail… - Wireless …, 2022 - Wiley Online Library
IoT emergence has given rise to a new digital experience of payment transactions where
physical objects like refrigerators, cars, and wearables will make payments. These physical …

Dynamics of botnet propagation in software defined networks using epidemic models

JF Balarezo, S Wang, KG Chavez, A Al-Hourani… - IEEE …, 2021 - ieeexplore.ieee.org
During COVID-19 the new normal became an increased reliance on remote connectivity,
and that fact is far away to change any time soon. The increasing number of networked …

Multi-agent reinforcement learning based algorithm detection of malware-infected nodes in IoT networks

M Severt, R Casado-Vara, ÁM del Rey… - Logic Journal of the …, 2024 - academic.oup.com
Abstract The Internet of Things (IoT) is a fast-growing technology that connects everyday
devices to the Internet, enabling wireless, low-consumption and low-cost communication …

Connectivity of Intelligent Reflecting Surface Assisted Network via Percolation Theory

Q Wu, X He, X Huang - IEEE Transactions on Cognitive …, 2023 - ieeexplore.ieee.org
The integrated access and backhaul (IAB) technology enables cost-effective ultradense
network deployment, by replacing wired transmission infrastructure. However, IAB is …

Optimized Degree-Aware Random Patching for Thwarting IoT Botnets

M Mohamed, H ElSawy, W Mesbah - IEEE Networking Letters, 2023 - ieeexplore.ieee.org
The massive number of Device-to-Device (D2D) communication links and lack of protective
programming cause Internet of Things (IoT) networks to be vulnerable to malware attacks …

On Building Firewall with White-Hat Bots to Prevent the Infection Spread of Malicious Botnets

R Matsumoto, S Yamaguchi - 2023 11th International …, 2023 - ieeexplore.ieee.org
This paper formulates the problem of building a firewall to prevent the spreading of a
malicious botnet using a given number of white-hat bots and proposes a solution. The …