Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination
Y Shen, S Shen, Z Wu, H Zhou, S Yu - Journal of Information Security and …, 2022 - Elsevier
IoT malware dissemination seriously exacerbates the decline of IoT system availability,
which deteriorates the users experience. To address the issue, we first predict the optimal …
which deteriorates the users experience. To address the issue, we first predict the optimal …
A Tutorial-Cum-Survey on Percolation Theory With Applications in Large-Scale Wireless Networks
Connectivity is an important key performance indicator and a focal point of research in large-
scale wireless networks. Due to path-loss attenuation of electromagnetic waves, direct …
scale wireless networks. Due to path-loss attenuation of electromagnetic waves, direct …
ECMT framework for internet of things: an integrative approach employing in-memory attribute examination and sophisticated neural network architectures in …
With the proliferation of connected devices in the Internet of Things (IoT), cybersecurity
threats have increased. Identifying malicious attacks in IoT requires advanced techniques …
threats have increased. Identifying malicious attacks in IoT requires advanced techniques …
Modeling, Critical Threshold, and Lowest-Cost Patching Strategy of Malware Propagation in Heterogeneous IoT Networks
X Wang, X Zhang, S Wang, J Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In heterogeneous Internet of Things (IoT) networks, various communication technologies
lead to different transmission ranges of nodes, and they can cooperatively provide seamless …
lead to different transmission ranges of nodes, and they can cooperatively provide seamless …
Towards Secure IoT‐Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
MNM Bhutta, S Bhattia, MA Alojail… - Wireless …, 2022 - Wiley Online Library
IoT emergence has given rise to a new digital experience of payment transactions where
physical objects like refrigerators, cars, and wearables will make payments. These physical …
physical objects like refrigerators, cars, and wearables will make payments. These physical …
Dynamics of botnet propagation in software defined networks using epidemic models
During COVID-19 the new normal became an increased reliance on remote connectivity,
and that fact is far away to change any time soon. The increasing number of networked …
and that fact is far away to change any time soon. The increasing number of networked …
Multi-agent reinforcement learning based algorithm detection of malware-infected nodes in IoT networks
M Severt, R Casado-Vara, ÁM del Rey… - Logic Journal of the …, 2024 - academic.oup.com
Abstract The Internet of Things (IoT) is a fast-growing technology that connects everyday
devices to the Internet, enabling wireless, low-consumption and low-cost communication …
devices to the Internet, enabling wireless, low-consumption and low-cost communication …
Connectivity of Intelligent Reflecting Surface Assisted Network via Percolation Theory
Q Wu, X He, X Huang - IEEE Transactions on Cognitive …, 2023 - ieeexplore.ieee.org
The integrated access and backhaul (IAB) technology enables cost-effective ultradense
network deployment, by replacing wired transmission infrastructure. However, IAB is …
network deployment, by replacing wired transmission infrastructure. However, IAB is …
Optimized Degree-Aware Random Patching for Thwarting IoT Botnets
The massive number of Device-to-Device (D2D) communication links and lack of protective
programming cause Internet of Things (IoT) networks to be vulnerable to malware attacks …
programming cause Internet of Things (IoT) networks to be vulnerable to malware attacks …
On Building Firewall with White-Hat Bots to Prevent the Infection Spread of Malicious Botnets
R Matsumoto, S Yamaguchi - 2023 11th International …, 2023 - ieeexplore.ieee.org
This paper formulates the problem of building a firewall to prevent the spreading of a
malicious botnet using a given number of white-hat bots and proposes a solution. The …
malicious botnet using a given number of white-hat bots and proposes a solution. The …