Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures

H Ahmad, I Dharmadasa, F Ullah, MA Babar - ACM Computing Surveys, 2023 - dl.acm.org
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …

Comparative analysis of LSTM, one-class SVM, and PCA to monitor real-time malware threats using system call sequences and virtual machine introspection

J Soni, SK Peddoju, N Prabakar… - … Computing and Electronics …, 2021 - Springer
Abstract System call analysis is based on a behavior-oriented anomaly detection technique,
which is well accepted due to its consistent performance. This study compares two popular …

Real-Time Intrusion Detection of Insider Threats in Industrial Control System Workstations Through File Integrity Monitoring

B Al-Muntaser, MA Mohamed… - International Journal of …, 2023 - search.proquest.com
Industrial control systems (ICS) play a crucial role in various industries and ensuring their
security is paramount for maintaining process continuity and reliability. In ICS, the most …

Highly-scalable container integrity monitoring for large-scale kubernetes cluster

H Kitahara, K Gajananan… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Container integrity monitoring is defined as key requirements for regulatory compliance,
such as PCI-DSS, in which any unexpected changes such as file updates or program runs …

Analyzing Data Theft Ransomware Traffic Patterns Using BERT

G Almeida, F Vasconcelos - 2023 - preprints.org
This research looks into the evolving dynamics of ransomware, shifting from conventional
encryption-based attacks to sophisticated data exfiltration strategies. Employing the …

File Integrity Monitoring as a Method for Detecting and Preventing Web Defacement Attacks

C Kurniawan, A Triayudi - Jurnal Online Informatika, 2024 - join.if.uinsgd.ac.id
The cybersecurity landscape in Indonesia recorded an increase in cyberattacks in 2022.
One of the types of attacks observed was web defacement attacks targeting government …

Detect and Mitigate Cyberattacks Using SIEM

ZS Younus, M Alanezi - 2023 16th International Conference on …, 2023 - ieeexplore.ieee.org
Cybersecurity is crucial to protect network resources and reduce the risk of cyberattacks like
denial of service (DOS) and file modification. Security tools like intrusion detection and …

Fingerprinting of Machines in Critical Systems for Integrity Monitoring and Verification

P Paliwal, A Sable, MK Hanawal - arXiv preprint arXiv:2412.16595, 2024 - arxiv.org
As cyber threats continue to evolve and diversify, it has become increasingly challenging to
identify the root causes of security breaches that occur between periodic security …

Iot-based patient health monitoring: A comprehensive survey

BS Murthy, SK Peddoju - ICT Analysis and Applications: Proceedings of …, 2021 - Springer
Nowadays, health monitoring is one of the rising fields that is rapidly creating and gaining
quick progress in its advancements. Various analysts have proposed different structures for …