Edge security: Challenges and issues
Edge computing is a paradigm that shifts data processing services to the network edge,
where data are generated. While such an architecture provides faster processing and …
where data are generated. While such an architecture provides faster processing and …
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence
D Kiwia, A Dehghantanha, KKR Choo… - Journal of computational …, 2018 - Elsevier
Malware such as banking Trojans are popular with financially-motivated cybercriminals.
Detection of banking Trojans remains a challenging task, due to the constant evolution of …
Detection of banking Trojans remains a challenging task, due to the constant evolution of …
An analysis of technology applications in the restaurant industry
M Cavusoglu - Journal of Hospitality and Tourism Technology, 2019 - emerald.com
Purpose This study aims to examine the utilization of Front of House (FOH) and Back of
House (BOH) technology applications in different types of US restaurants along with their …
House (BOH) technology applications in different types of US restaurants along with their …
An overview of software functionality service: A systematic literature review
MA Salleh, M Bahari, NH Zakaria - Procedia Computer Science, 2017 - Elsevier
This study focuses in contributing a literature on software functionality service area. We aim
to provide an overview of software functionality service related to its research activity …
to provide an overview of software functionality service related to its research activity …
Characterization and evaluation of IoT protocols for data exfiltration
D Uroz, RJ Rodríguez - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Data exfiltration relies primarily on network protocols for unauthorized data transfers from
information systems. In addition to well-established Internet protocols (such as DNS, ICMP …
information systems. In addition to well-established Internet protocols (such as DNS, ICMP …
Shielding federated learning systems against inference attacks with ARM TrustZone
Federated Learning (FL) opens new perspectives for training machine learning models
while keeping personal data on the users premises. Specifically, in FL, models are trained …
while keeping personal data on the users premises. Specifically, in FL, models are trained …
A taxonomy of various attacks on smart card–based applications and countermeasures
BB Gupta, M Quamara - Concurrency and Computation …, 2021 - Wiley Online Library
Deployment of smart card–based applications is becoming prevalent these days. Security of
these applications depends upon the nature of underlying hardware and software platforms …
these applications depends upon the nature of underlying hardware and software platforms …
RV-TEE: secure cryptographic protocol execution based on runtime verification
Analytical security of cryptographic protocols does not immediately translate to operational
security due to incorrect implementation and attacks targeting the execution environment …
security due to incorrect implementation and attacks targeting the execution environment …
Protecting sensitive information in the volatile memory from disclosure attacks
S Malliaros, C Ntantogian… - 2016 11th International …, 2016 - ieeexplore.ieee.org
The protection of the volatile memory data is an issue of crucial importance, since
authentication credentials and cryptographic keys remain in the volatile memory. For this …
authentication credentials and cryptographic keys remain in the volatile memory. For this …
[PDF][PDF] Using Deep Learning with Attention to Detect Data Exfiltration by POS Malware.
In recent years, electronic payment through Point-of-Sale (POS) systems has become
popular. For this reason, POS devices are becoming more targeted by cyber attacks. In …
popular. For this reason, POS devices are becoming more targeted by cyber attacks. In …