[HTML][HTML] A blockchain future for internet of things security: a position paper
M Banerjee, J Lee, KKR Choo - Digital Communications and Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly being found in civilian and military
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …
contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of …
CloudIntell: An intelligent malware detection system
Enterprises and individual users heavily rely on the abilities of antiviruses and other security
mechanisms. However, the methodologies used by such software are not enough to detect …
mechanisms. However, the methodologies used by such software are not enough to detect …
Key requirements for the detection and sharing of behavioral indicators of compromise
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …
These indicators are the main source of tactical cyber intelligence most organizations benefit …
An intelligent and time-efficient DDoS identification framework for real-time enterprise networks: SAD-F: Spark based anomaly detection framework
Enterprise networks face a large number of threats that are managed and mitigated with a
combination of proprietary and third-party security tools and services. However, the …
combination of proprietary and third-party security tools and services. However, the …
[PDF][PDF] Blockchain technology for security and privacy issues in internet of things
A Gupta, B Gupta, KK Gola - International Journal of Scientific and …, 2020 - academia.edu
Blockchain technology is a secure way of holding the record of data. It support distributed
public ledger. Blockchain support data storage, real estate, asset manager other financial …
public ledger. Blockchain support data storage, real estate, asset manager other financial …
Evaluation of AV systems against modern malware
A Zarghoon, I Awan, JP Disso… - 2017 12th International …, 2017 - ieeexplore.ieee.org
Countering the proliferation of malware has been for recent years one of the top priorities for
governments, businesses, critical infrastructure, and end users. Despite the apparent …
governments, businesses, critical infrastructure, and end users. Despite the apparent …
On viability of detecting malwares online using ensemble classification method with performance metrics
N Saranya, V Manikandan - Computational Intelligence, 2020 - Wiley Online Library
Nowadays, most of the services from cloud are protuberant within the all commercial, public,
and private areas. A primary difficulty of cloud computing system is making a virtualized …
and private areas. A primary difficulty of cloud computing system is making a virtualized …
SBRT: API signature behaviour based representation technique for improving metamorphic malware detection
GAN Mohamed, NB Ithnin - … of the 2nd International Conference of …, 2018 - Springer
Malware a piece of code that deliberately fulfills the harmful intent of an attacker causes
harm to the host computer, it is considered as the root cause of many Internet security …
harm to the host computer, it is considered as the root cause of many Internet security …
Risk Modelling of Cyber Threats Against MIS and ERP Applications
A Efe - Pamukkale Üniversitesi İşletme Araştırmaları Dergisi, 2024 - dergipark.org.tr
This study presents a detailed examination of cyber threats impacting Management
Information Systems (MIS) and Enterprise Resource Planning (ERP) applications. It explores …
Information Systems (MIS) and Enterprise Resource Planning (ERP) applications. It explores …
Modeling of advanced threat actors: characterization, categorization and detection
A Villalón Huerta - 2023 - riunet.upv.es
[EN] Information and its related technologies are a critical asset to protect for people,
organizations and even whole countries. Our dependency on information technologies …
organizations and even whole countries. Our dependency on information technologies …