[HTML][HTML] A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments

A Farraj, E Hammad - Sensors (Basel, Switzerland), 2024 - pmc.ncbi.nlm.nih.gov
Intentional electromagnetic interference attacks (eg, jamming) against wireless connected
devices such as the Internet of Things (IoT) remain a serious challenge, especially as such …

[PDF][PDF] Leveraging Generative Artificial Intelligence (AI) for cybersecurity: Analyzing diffusion models in detecting and mitigating cyber threats

AR Akinyele, OO Ajayi, G Munyaneza… - GSC Advanced …, 2024 - researchgate.net
Due to the increased number of cyber dangers in today's digitally connected world, more
advanced and flexible security measures have had to be created. Using generative artificial …

[HTML][HTML] Intelligent Fault Diagnosis of Planetary Gearbox Across Conditions Based on Subdomain Distribution Adversarial Adaptation

S Han, Z Feng, Y Zhang, M Du, Y Yang - Sensors, 2024 - mdpi.com
Sensory data are the basis for the intelligent health state awareness of planetary gearboxes,
which are the critical components of electromechanical systems. Despite the advantages of …

[HTML][HTML] Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data

M Naseer, F Ullah, S Ijaz, H Naeem… - Sensors (Basel …, 2025 - pmc.ncbi.nlm.nih.gov
Android malware detection remains a critical issue for mobile security. Cybercriminals target
Android since it is the most popular smartphone operating system (OS). Malware detection …

[PDF][PDF] An expert system of recommendations for combating cyber threats using CVSS metrics and game theory

МВ Міщенко, МС Дорош - Вісник сучасних інформаційних технологій, 2024 - hait.od.ua
This study is focused on the creation of an expert system for generating recommendations
on cyber security. The developed expert system uses a game-theoretic model as a inference …

[PDF][PDF] Data Privacy and Security in E-commerce: Utilizing Blockchain and Multi-Factor Authentication to Safeguard Transactions

M Zishan, S Russell - researchgate.net
In the evolving landscape of e-commerce, the protection of data privacy and security has
become paramount due to increasing cyber threats and sophisticated attacks. This abstract …

[PDF][PDF] Building a Future Networks Security Ecosystem: Leveraging Big Data and AI in Cybersecurity for Risk Assessment and Threat Detection

J Linda, M Khan - researchgate.net
In the rapidly evolving landscape of cybersecurity, traditional approaches to risk assessment
and threat detection are increasingly inadequate. The advent of Big Data and Artificial …

Privacy-Aware Federated Learning Framework for Securing Iot Devices Using Chameleon Swarm Algorithm with Self Attentive Variational Autoencoder Model

S Alahmari - Available at SSRN 4966315 - papers.ssrn.com
Abstract The Internet of Things (IoT) is revolutionizing various applications, but its rapid
growth presents significant security and privacy challenges. IoT systems collect vast …