[HTML][HTML] A blockchain future for internet of things security: a position paper

M Banerjee, J Lee, KKR Choo - Digital Communications and Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly being found in civilian and military
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …

CloudIntell: An intelligent malware detection system

QKA Mirza, I Awan, M Younas - Future Generation Computer Systems, 2018 - Elsevier
Enterprises and individual users heavily rely on the abilities of antiviruses and other security
mechanisms. However, the methodologies used by such software are not enough to detect …

Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

An intelligent and time-efficient DDoS identification framework for real-time enterprise networks: SAD-F: Spark based anomaly detection framework

A Ahmed, S Hameed, M Rafi, QKA Mirza - IEEE Access, 2020 - ieeexplore.ieee.org
Enterprise networks face a large number of threats that are managed and mitigated with a
combination of proprietary and third-party security tools and services. However, the …

[PDF][PDF] Blockchain technology for security and privacy issues in internet of things

A Gupta, B Gupta, KK Gola - International Journal of Scientific and …, 2020 - academia.edu
Blockchain technology is a secure way of holding the record of data. It support distributed
public ledger. Blockchain support data storage, real estate, asset manager other financial …

Evaluation of AV systems against modern malware

A Zarghoon, I Awan, JP Disso… - 2017 12th International …, 2017 - ieeexplore.ieee.org
Countering the proliferation of malware has been for recent years one of the top priorities for
governments, businesses, critical infrastructure, and end users. Despite the apparent …

On viability of detecting malwares online using ensemble classification method with performance metrics

N Saranya, V Manikandan - Computational Intelligence, 2020 - Wiley Online Library
Nowadays, most of the services from cloud are protuberant within the all commercial, public,
and private areas. A primary difficulty of cloud computing system is making a virtualized …

SBRT: API signature behaviour based representation technique for improving metamorphic malware detection

GAN Mohamed, NB Ithnin - … of the 2nd International Conference of …, 2018 - Springer
Malware a piece of code that deliberately fulfills the harmful intent of an attacker causes
harm to the host computer, it is considered as the root cause of many Internet security …

Risk Modelling of Cyber Threats Against MIS and ERP Applications

A Efe - Pamukkale Üniversitesi İşletme Araştırmaları Dergisi, 2024 - dergipark.org.tr
This study presents a detailed examination of cyber threats impacting Management
Information Systems (MIS) and Enterprise Resource Planning (ERP) applications. It explores …

Modeling of advanced threat actors: characterization, categorization and detection

A Villalón Huerta - 2023 - riunet.upv.es
[EN] Information and its related technologies are a critical asset to protect for people,
organizations and even whole countries. Our dependency on information technologies …