Quantum machine learning for security assessment in the Internet of Medical Things (IoMT)

AS Rajawat, SB Goyal, P Bedi, T Jan… - Future Internet, 2023 - mdpi.com
Internet of Medical Things (IoMT) is an ecosystem composed of connected electronic items
such as small sensors/actuators and other cyber-physical devices (CPDs) in medical …

Deep learning-based solution for smart contract vulnerabilities detection

X Tang, Y Du, A Lai, Z Zhang, L Shi - Scientific Reports, 2023 - nature.com
This paper aims to explore the application of deep learning in smart contract vulnerabilities
detection. Smart contracts are an essential part of blockchain technology and are crucial for …

A cosine similarity-based labeling technique for vulnerability type detection using source codes

MM Öztürk - Computers & Security, 2024 - Elsevier
Vulnerability detection is of great importance in providing reliability to software systems.
Although existing methods achieve remarkable success in vulnerability detection, they have …

Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature …

S Hussain, M Nadeem, J Baber, M Hamdi, A Rajab… - Scientific Reports, 2024 - nature.com
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …

A secure network path of implantable medical devices for detecting the vulnerabilities using hybrid DBNF network

C Thyagarajan, SV Bhanu, S Suthir - Biomedical Signal Processing and …, 2024 - Elsevier
IoT is complicated as it contains a huge number of devices which saves data and promotes
functionality of each device. Generally, such models include real-time functioning as it is a …

IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications

GP Bhandari, G Assres, N Gavric, A Shalaginov… - International Journal of …, 2024 - Springer
The proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of
connectivity and convenience. Consequently, rapid IoT expansion has introduced …

[HTML][HTML] VulnMiner: A comprehensive framework for vulnerability collection from C/C++ source code projects

G Bhandari, N Gavric, A Shalaginov - Software Impacts, 2024 - Elsevier
The study introduces VulnMiner, a comprehensive framework encompassing a data
extraction tool tailored for identifying vulnerabilities in C/C++ source code. Moreover, it …

[PDF][PDF] Shumaila Hussain, Muhammad Nadeem 3, Junaid Baber 2, 4, Mohammed Hamdi 5

A Rajab, MS Al Reshan, A Shaikh - Scientific Reports, 2024 - researchgate.net
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …

A Smart Framework to Detect Threats and Protect Data of IoT based on Machine Learning

AM Almasabi, M Khemakhem, F Eassa… - IEEE …, 2024 - ieeexplore.ieee.org
The widespread use of IoT devices has introduced new challenges, particularly related to
security and privacy threats such as unauthorized data access and device breaches. The …

Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices

YR Siwakoti, DB Rawat - Proceedings of the Twenty-fourth International …, 2023 - dl.acm.org
The rapid expansion of IoT brings unmatched convenience and connectivity, but it also
raises significant security concerns. The prioritization of functionality over security in IoT …