Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-
access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by …
access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by …
Security considerations for Internet of Things: A survey
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
An attack detection framework based on BERT and deep learning
YE Seyyar, AG Yavuz, HM Ünver - IEEE Access, 2022 - ieeexplore.ieee.org
Deep Learning (DL) and Natural Language Processing (NLP) techniques are improving and
enriching with a rapid pace. Furthermore, we witness that the use of web applications is …
enriching with a rapid pace. Furthermore, we witness that the use of web applications is …
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions
During the COVID-19 pandemic, most organizations were forced to implement a work-from-
home policy, and in many cases, employees have not been expected to return to the office …
home policy, and in many cases, employees have not been expected to return to the office …
SoK: Design, vulnerabilities and defense of cryptocurrency wallets
The rapid growth of decentralized digital currencies, enabled by blockchain technology, has
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
ushered in a new era of peer-to-peer transactions, revolutionizing the global economy …
[HTML][HTML] An innovative GPT-based open-source intelligence using historical cyber incident reports
F Sufi - Natural Language Processing Journal, 2024 - Elsevier
In contemporary discourse, the pervasive influences of Generative Pre-Trained (GPT) and
Large Language Models (LLM) are evident, showcasing diverse applications. GPT-based …
Large Language Models (LLM) are evident, showcasing diverse applications. GPT-based …
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux
An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as
Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything …
Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything …
[PDF][PDF] Block-hash of blockchain framework against man-in-the-middle attacks
Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain
technology offers methods such as peer to peer, block hash, and proof-of-work to secure the …
technology offers methods such as peer to peer, block hash, and proof-of-work to secure the …
Application layer security for Internet communications: A comprehensive review, challenges, and future trends
D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024 - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …