[HTML][HTML] Static analysis of information systems for IoT cyber security: a survey of machine learning approaches
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …
their software. One of the most in-demand methods that has repeatedly been proven to be …
[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …
operated through the Internet, enable the transfer of data among objects or people …
HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version)
Internet of Things (IoT) devices have become ubiquitous, with applications in many domains,
including industry, transportation, and healthcare; these devices also have many household …
including industry, transportation, and healthcare; these devices also have many household …
A Survey on Security Issues in IoT Operating Systems
P Sun, Y Wan, Z Wu, Z Fang - Journal of Network and Computer …, 2024 - Elsevier
The security issues of the core (operating systems) of the Internet of Things (IoT) are
becoming increasingly urgent and prominent, this article conducts a systematic research …
becoming increasingly urgent and prominent, this article conducts a systematic research …
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching
Open source software (OSS) supply chains have been attractive targets for attacks. One of
the significant, popular attacks is realized by malicious packages on package registries …
the significant, popular attacks is realized by malicious packages on package registries …
An Efficient Framework for Security of Internet‐of‐Things Devices against Malicious Software Updates
The advent of smart cities has revolutionized urban living by providing innovative solutions,
such as smart homes, smart hospitals, and smart parking. These smart applications have …
such as smart homes, smart hospitals, and smart parking. These smart applications have …
Understanding and detecting remote infection on linux-based IoT devices
The rocketed population, poor security, and 24/7 online properties make Linux-based
Internet of Things (IoT) devices ideal targets for attackers. However, due to the budget …
Internet of Things (IoT) devices ideal targets for attackers. However, due to the budget …
Analyzing the Attack Pattern of Brute Force Attack on SSH Port
Cyberattacks are one of the threats in the world of technology. Various kinds of cyberattacks
can be a threat to information security. One example of a cyberattack is a brute force attack …
can be a threat to information security. One example of a cyberattack is a brute force attack …
MLxPack: Investigating the effects of packers on ML-based Malware detection systems using static and dynamic traits
Malware is one of the serious computer security threats. To protect computers from infection,
accurate detection of malware is essential. At the same time, malware detection faces two …
accurate detection of malware is essential. At the same time, malware detection faces two …
[HTML][HTML] MDABP: a novel approach to detect cross-architecture IoT malware based on PaaS
Y Zhao, A Kuerban - Sensors, 2023 - mdpi.com
With the development of internet technology, the Internet of Things (IoT) has been widely
used in several aspects of human life. However, IoT devices are becoming more vulnerable …
used in several aspects of human life. However, IoT devices are becoming more vulnerable …