An integral cybersecurity approach using a many-objective optimization strategy

O Salinas, R Soto, B Crawford, R Olivares - IEEE Access, 2023 - ieeexplore.ieee.org
Data networks and computing devices have experienced exponential growth. Within a short
span of time, they have opened new digital frontiers while also bringing forth new threats …

Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs

J Manzoor, A Waleed, AF Jamali, A Masood - Plos one, 2024 - journals.plos.org
The proliferation of cyber threats necessitates robust security measures to safeguard critical
assets and data in today's evolving digital landscape. Small and Medium Enterprises …

Assessing security of software components for Internet of Things: a systematic review and future directions

Z Liao, S Nazir, HU Khan… - Security and …, 2021 - Wiley Online Library
Software component plays a significant role in the functionality of software systems.
Component of software is the existing and reusable parts of a software system that is …

[PDF][PDF] State of the art in privacy preservation in video data

S Aleksic, L Colonna, C Dantas, A Fedosov… - Zenodo, 2022 - zora.uzh.ch
State of the art in privacy preservation in video data Page 1 Working Group 2. Privacy-by-design
in audio and video data March 2022 State of the art in privacy preservation in video data Page …

Analysis of Internet of Things based on characteristics, functionalities, and challenges

G Khekare, P Verma, U Dhanre, S Raut… - International Journal of …, 2021 - igi-global.com
The internet of things (IoT) is transpiring technology. In the last decade, demand of IoT has
been increased due to various things like the use of smart devices; increased demand for …

[HTML][HTML] A formal consensus-based distributed monitoring approach for mobile IoT networks

JAA Aldana, S Maag, F Zaidi - Internet of Things, 2021 - Elsevier
Abstract Internet of Things (IoT) represent a significant area of network research due to the
many opportunities derived from the problematics and applications. The most recurring …

Мониторинг безопасности в IOT-сетях

ДА Баев, РО Волков, АД Зонов - StudNet, 2021 - cyberleninka.ru
В данной статье рассматривается вопросы мониторинга в сетях интернета вещей, а
именно вопросы применения мониторинга для контроля процессов, происходящих …

Privacy attack on IoT: a systematic literature review

LM Zagi, B Aziz - 2020 International Conference on ICT for …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …

Visual analytics for security threats detection in Ethereum consensus layer

X Chen, X Zhang, Z Wang, K Yu, W Kam-Kwai… - Journal of …, 2024 - Springer
The Ethereum consensus layer provides the Proof of Stake (PoS) consensus algorithm with
the beacon chain for the Ethereum blockchain network. However, the beacon chain is …

Impacts of information technology and risk management on cybersecurity governance: Empirical study on malaysian financial institutions

S Hasnan, D Hamka, ARM Hussain, MM Ali… - 2023 - indianjournals.com
Cybersecurity threats have successfully targeted financial institutions worldwide due to the
increased connectivity of seamless and borderless financial services. Considering that …