Edge security: Challenges and issues

X Jin, C Katsis, F Sang, J Sun, A Kundu… - arXiv preprint arXiv …, 2022 - arxiv.org
Edge computing is a paradigm that shifts data processing services to the network edge,
where data are generated. While such an architecture provides faster processing and …

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence

D Kiwia, A Dehghantanha, KKR Choo… - Journal of computational …, 2018 - Elsevier
Malware such as banking Trojans are popular with financially-motivated cybercriminals.
Detection of banking Trojans remains a challenging task, due to the constant evolution of …

An analysis of technology applications in the restaurant industry

M Cavusoglu - Journal of Hospitality and Tourism Technology, 2019 - emerald.com
Purpose This study aims to examine the utilization of Front of House (FOH) and Back of
House (BOH) technology applications in different types of US restaurants along with their …

An overview of software functionality service: A systematic literature review

MA Salleh, M Bahari, NH Zakaria - Procedia Computer Science, 2017 - Elsevier
This study focuses in contributing a literature on software functionality service area. We aim
to provide an overview of software functionality service related to its research activity …

Characterization and evaluation of IoT protocols for data exfiltration

D Uroz, RJ Rodríguez - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Data exfiltration relies primarily on network protocols for unauthorized data transfers from
information systems. In addition to well-established Internet protocols (such as DNS, ICMP …

Shielding federated learning systems against inference attacks with ARM TrustZone

AA Messaoud, SB Mokhtar, V Nitu… - Proceedings of the 23rd …, 2022 - dl.acm.org
Federated Learning (FL) opens new perspectives for training machine learning models
while keeping personal data on the users premises. Specifically, in FL, models are trained …

A taxonomy of various attacks on smart card–based applications and countermeasures

BB Gupta, M Quamara - Concurrency and Computation …, 2021 - Wiley Online Library
Deployment of smart card–based applications is becoming prevalent these days. Security of
these applications depends upon the nature of underlying hardware and software platforms …

RV-TEE: secure cryptographic protocol execution based on runtime verification

M Vella, C Colombo, R Abela, P Špaček - Journal of Computer Virology …, 2021 - Springer
Analytical security of cryptographic protocols does not immediately translate to operational
security due to incorrect implementation and attacks targeting the execution environment …

Protecting sensitive information in the volatile memory from disclosure attacks

S Malliaros, C Ntantogian… - 2016 11th International …, 2016 - ieeexplore.ieee.org
The protection of the volatile memory data is an issue of crucial importance, since
authentication credentials and cryptographic keys remain in the volatile memory. For this …

[PDF][PDF] Using Deep Learning with Attention to Detect Data Exfiltration by POS Malware.

G Martino, FA Galatolo, MGCA Cimino, C Callegari - ICEIS (1), 2023 - scitepress.org
In recent years, electronic payment through Point-of-Sale (POS) systems has become
popular. For this reason, POS devices are becoming more targeted by cyber attacks. In …