An integral cybersecurity approach using a many-objective optimization strategy
O Salinas, R Soto, B Crawford, R Olivares - IEEE Access, 2023 - ieeexplore.ieee.org
Data networks and computing devices have experienced exponential growth. Within a short
span of time, they have opened new digital frontiers while also bringing forth new threats …
span of time, they have opened new digital frontiers while also bringing forth new threats …
Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs
The proliferation of cyber threats necessitates robust security measures to safeguard critical
assets and data in today's evolving digital landscape. Small and Medium Enterprises …
assets and data in today's evolving digital landscape. Small and Medium Enterprises …
Assessing security of software components for Internet of Things: a systematic review and future directions
Software component plays a significant role in the functionality of software systems.
Component of software is the existing and reusable parts of a software system that is …
Component of software is the existing and reusable parts of a software system that is …
[PDF][PDF] State of the art in privacy preservation in video data
State of the art in privacy preservation in video data Page 1 Working Group 2. Privacy-by-design
in audio and video data March 2022 State of the art in privacy preservation in video data Page …
in audio and video data March 2022 State of the art in privacy preservation in video data Page …
Analysis of Internet of Things based on characteristics, functionalities, and challenges
The internet of things (IoT) is transpiring technology. In the last decade, demand of IoT has
been increased due to various things like the use of smart devices; increased demand for …
been increased due to various things like the use of smart devices; increased demand for …
[HTML][HTML] A formal consensus-based distributed monitoring approach for mobile IoT networks
JAA Aldana, S Maag, F Zaidi - Internet of Things, 2021 - Elsevier
Abstract Internet of Things (IoT) represent a significant area of network research due to the
many opportunities derived from the problematics and applications. The most recurring …
many opportunities derived from the problematics and applications. The most recurring …
Мониторинг безопасности в IOT-сетях
ДА Баев, РО Волков, АД Зонов - StudNet, 2021 - cyberleninka.ru
В данной статье рассматривается вопросы мониторинга в сетях интернета вещей, а
именно вопросы применения мониторинга для контроля процессов, происходящих …
именно вопросы применения мониторинга для контроля процессов, происходящих …
Privacy attack on IoT: a systematic literature review
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …
Visual analytics for security threats detection in Ethereum consensus layer
X Chen, X Zhang, Z Wang, K Yu, W Kam-Kwai… - Journal of …, 2024 - Springer
The Ethereum consensus layer provides the Proof of Stake (PoS) consensus algorithm with
the beacon chain for the Ethereum blockchain network. However, the beacon chain is …
the beacon chain for the Ethereum blockchain network. However, the beacon chain is …
Impacts of information technology and risk management on cybersecurity governance: Empirical study on malaysian financial institutions
Cybersecurity threats have successfully targeted financial institutions worldwide due to the
increased connectivity of seamless and borderless financial services. Considering that …
increased connectivity of seamless and borderless financial services. Considering that …