[HTML][HTML] Cyber security in iot-based cloud computing: A comprehensive survey
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …
at various locations and are accessible from various industrial environments. Cloud …
A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …
Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …
and communication advancements will empower better administration of accessible …
Distributed denial of service attack prediction: Challenges, open issues and opportunities
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …
DDoS attacks have evolved in quantity and volume to evade detection and increase …
[HTML][HTML] A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions
AR Javed, Z Jalil, W Zehra, TR Gadekallu… - … Applications of Artificial …, 2021 - Elsevier
With the explosive advancements in smartphone technology, video uploading/downloading
has become a routine part of digital social networking. Video contents contain valuable …
has become a routine part of digital social networking. Video contents contain valuable …
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT
Devices belonging to the realm of edge Internet of Things (IoT) are becoming highly
susceptible to intrusion attacks. The large-scale development in edge IoT, ease of …
susceptible to intrusion attacks. The large-scale development in edge IoT, ease of …
A novel ensemble machine learning method to detect phishing attack
Currently and particularly with remote working scenarios during COVID-19, phishing attack
has become one of the most significant threats faced by internet users, organizations, and …
has become one of the most significant threats faced by internet users, organizations, and …
[HTML][HTML] A novel hybrid feature selection and ensemble-based machine learning approach for botnet detection
MA Hossain, MS Islam - Scientific Reports, 2023 - nature.com
In the age of sophisticated cyber threats, botnet detection remains a crucial yet complex
security challenge. Existing detection systems are continually outmaneuvered by the …
security challenge. Existing detection systems are continually outmaneuvered by the …
Efficient detection of botnet traffic by features selection and decision trees
J Velasco-Mata, V González-Castro… - IEEE …, 2021 - ieeexplore.ieee.org
Botnets are one of the online threats with the most significant presence, causing billionaire
losses to global economies. Nowadays, the increasing number of devices connected to the …
losses to global economies. Nowadays, the increasing number of devices connected to the …
[HTML][HTML] IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
The emergence of drone-based innovative cyber security solutions integrated with the
Internet of Things (IoT) has revolutionized navigational technologies with robust data …
Internet of Things (IoT) has revolutionized navigational technologies with robust data …