Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

MA Khatun, SF Memon, C Eising, LL Dhirani - IEEE Access, 2023 - ieeexplore.ieee.org
The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …

Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking

MB Muzammil, M Bilal, S Ajmal, SC Shongwe… - IEEE …, 2024 - ieeexplore.ieee.org
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-
access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

An attack detection framework based on BERT and deep learning

YE Seyyar, AG Yavuz, HM Ünver - IEEE Access, 2022 - ieeexplore.ieee.org
Deep Learning (DL) and Natural Language Processing (NLP) techniques are improving and
enriching with a rapid pace. Furthermore, we witness that the use of web applications is …

Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions

J Kotak, E Habler, O Brodt, A Shabtai, Y Elovici - Sensors, 2023 - mdpi.com
During the COVID-19 pandemic, most organizations were forced to implement a work-from-
home policy, and in many cases, employees have not been expected to return to the office …

SoK: Design, vulnerabilities and defense of cryptocurrency wallets

Y Erinle, Y Kethepalli, Y Feng, J Xu - arXiv preprint arXiv:2307.12874, 2023 - arxiv.org
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …

[HTML][HTML] An innovative GPT-based open-source intelligence using historical cyber incident reports

F Sufi - Natural Language Processing Journal, 2024 - Elsevier
In contemporary discourse, the pervasive influences of Generative Pre-Trained (GPT) and
Large Language Models (LLM) are evident, showcasing diverse applications. GPT-based …

Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux

S Jeong, M Ryu, H Kang, HK Kim - … of the Thirteenth ACM Conference on …, 2023 - dl.acm.org
An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as
Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything …

[PDF][PDF] Block-hash of blockchain framework against man-in-the-middle attacks

I Riadi, R Umar, I Busthomi… - Register: Jurnal Ilmiah …, 2022 - journal.unipdu.ac.id
Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain
technology offers methods such as peer to peer, block hash, and proof-of-work to secure the …

Application layer security for Internet communications: A comprehensive review, challenges, and future trends

D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024 - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …