Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions

M Elhoseny, NN Thilakarathne, MI Alghamdi… - Sustainability, 2021 - mdpi.com
The rapid development and the expansion of Internet of Things (IoT)-powered technologies
have strengthened the way we live and the quality of our lives in many ways by combining …

A survey on security and privacy issues in modern healthcare systems: Attacks and defenses

AKMI Newaz, AK Sikder, MA Rahman… - ACM Transactions on …, 2021 - dl.acm.org
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …

Unsupervised anomaly-based malware detection using hardware features

A Tang, S Sethumadhavan, SJ Stolfo - Research in Attacks, Intrusions and …, 2014 - Springer
Recent works have shown promise in detecting malware programs based on their dynamic
microarchitectural execution patterns. Compared to higher-level features like OS and …

{GSMem}: Data exfiltration from {Air-Gapped} computers over {GSM} frequencies

M Guri, A Kachlon, O Hasson, G Kedma… - 24th USENIX Security …, 2015 - usenix.org
Air-gapped networks are isolated, separated both logically and physically from public
networks. Although the feasibility of invading such systems has been demonstrated in recent …

A survey of intrusion detection systems leveraging host data

RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …

A security model based on lightgbm and transformer to protect healthcare systems from cyberattacks

A Ghourabi - IEEE Access, 2022 - ieeexplore.ieee.org
Cybersecurity incidents have become a growing problem for the healthcare industry since
the widespread introduction of technology into the healthcare systems. In recent years, the …

Enforcing security in Internet of Things frameworks: A systematic literature review

M Aly, F Khomh, M Haoues, A Quintero, S Yacout - Internet of Things, 2019 - Elsevier
With the rise of the Internet of Things (IoT) technology, the number of IoT devices/sensors
has increased significantly. It is anticipated that large-scale sensor-based systems will …