Ai-based mobile edge computing for iot: Applications, challenges, and future scope
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …
A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …
critical civil and military domains for achieving information superiority, operational efficacy …
Comparative analysis of LSTM, one-class SVM, and PCA to monitor real-time malware threats using system call sequences and virtual machine introspection
Abstract System call analysis is based on a behavior-oriented anomaly detection technique,
which is well accepted due to its consistent performance. This study compares two popular …
which is well accepted due to its consistent performance. This study compares two popular …
Real-Time Intrusion Detection of Insider Threats in Industrial Control System Workstations Through File Integrity Monitoring
B Al-Muntaser, MA Mohamed… - International Journal of …, 2023 - search.proquest.com
Industrial control systems (ICS) play a crucial role in various industries and ensuring their
security is paramount for maintaining process continuity and reliability. In ICS, the most …
security is paramount for maintaining process continuity and reliability. In ICS, the most …
Highly-scalable container integrity monitoring for large-scale kubernetes cluster
H Kitahara, K Gajananan… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Container integrity monitoring is defined as key requirements for regulatory compliance,
such as PCI-DSS, in which any unexpected changes such as file updates or program runs …
such as PCI-DSS, in which any unexpected changes such as file updates or program runs …
Analyzing Data Theft Ransomware Traffic Patterns Using BERT
G Almeida, F Vasconcelos - 2023 - preprints.org
This research looks into the evolving dynamics of ransomware, shifting from conventional
encryption-based attacks to sophisticated data exfiltration strategies. Employing the …
encryption-based attacks to sophisticated data exfiltration strategies. Employing the …
File Integrity Monitoring as a Method for Detecting and Preventing Web Defacement Attacks
C Kurniawan, A Triayudi - Jurnal Online Informatika, 2024 - join.if.uinsgd.ac.id
The cybersecurity landscape in Indonesia recorded an increase in cyberattacks in 2022.
One of the types of attacks observed was web defacement attacks targeting government …
One of the types of attacks observed was web defacement attacks targeting government …
Detect and Mitigate Cyberattacks Using SIEM
Cybersecurity is crucial to protect network resources and reduce the risk of cyberattacks like
denial of service (DOS) and file modification. Security tools like intrusion detection and …
denial of service (DOS) and file modification. Security tools like intrusion detection and …
Fingerprinting of Machines in Critical Systems for Integrity Monitoring and Verification
P Paliwal, A Sable, MK Hanawal - arXiv preprint arXiv:2412.16595, 2024 - arxiv.org
As cyber threats continue to evolve and diversify, it has become increasingly challenging to
identify the root causes of security breaches that occur between periodic security …
identify the root causes of security breaches that occur between periodic security …
Iot-based patient health monitoring: A comprehensive survey
BS Murthy, SK Peddoju - ICT Analysis and Applications: Proceedings of …, 2021 - Springer
Nowadays, health monitoring is one of the rising fields that is rapidly creating and gaining
quick progress in its advancements. Various analysts have proposed different structures for …
quick progress in its advancements. Various analysts have proposed different structures for …