Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Dynamic malware analysis in the modern era—A state of the art survey
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …
the sophistication and innovation of malware has increased over the years. In particular, the …
A comprehensive study of security of internet-of-things
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …
transformative approach for providing numerous services. Compact smart devices constitute …
Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions
The rapid development and the expansion of Internet of Things (IoT)-powered technologies
have strengthened the way we live and the quality of our lives in many ways by combining …
have strengthened the way we live and the quality of our lives in many ways by combining …
A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
Unsupervised anomaly-based malware detection using hardware features
Recent works have shown promise in detecting malware programs based on their dynamic
microarchitectural execution patterns. Compared to higher-level features like OS and …
microarchitectural execution patterns. Compared to higher-level features like OS and …
{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies
M Guri, A Kachlon, O Hasson, G Kedma… - 24th USENIX Security …, 2015 - usenix.org
Air-gapped networks are isolated, separated both logically and physically from public
networks. Although the feasibility of invading such systems has been demonstrated in recent …
networks. Although the feasibility of invading such systems has been demonstrated in recent …
A survey of intrusion detection systems leveraging host data
RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …
A security model based on lightgbm and transformer to protect healthcare systems from cyberattacks
A Ghourabi - IEEE Access, 2022 - ieeexplore.ieee.org
Cybersecurity incidents have become a growing problem for the healthcare industry since
the widespread introduction of technology into the healthcare systems. In recent years, the …
the widespread introduction of technology into the healthcare systems. In recent years, the …
Enforcing security in Internet of Things frameworks: A systematic literature review
With the rise of the Internet of Things (IoT) technology, the number of IoT devices/sensors
has increased significantly. It is anticipated that large-scale sensor-based systems will …
has increased significantly. It is anticipated that large-scale sensor-based systems will …