A review of android malware detection approaches based on machine learning
K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …
malware is also emerging in an endless stream. Many researchers have studied the …
Network intrusion detection for IoT security based on learning techniques
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
A detailed investigation and analysis of using machine learning techniques for intrusion detection
P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …
significant number of techniques have been developed which are based on machine …
Peek-a-boo: I see your smart home activities, even encrypted!
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …
allow users to easily control the physical world around them and facilitate their living styles …
[HTML][HTML] SmartHealth: An intelligent framework to secure IoMT service applications using machine learning
Due to the complex functioning of Smart Healthcare Systems (SHS), many security concerns
have been raised in the past. It provisions the attackers to hamper the working of SHS in a …
have been raised in the past. It provisions the attackers to hamper the working of SHS in a …
A survey on network security for cyber–physical systems: From threats to resilient design
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …
world and control software in computing systems. In CPS, the real world and the computing …
Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems
We propose a new class of signal injection attacks on microphones by physically converting
light to sound. We show how an attacker can inject arbitrary audio signals to a target …
light to sound. We show how an attacker can inject arbitrary audio signals to a target …
A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …