Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions

E Altulaihan, MA Almaiah, A Aljughaiman - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) interconnects physical and virtual objects embedded with
sensors, software, and other technologies, which exchange data using the Internet. This …

Social media analytics on Russia–Ukraine cyber war with natural language processing: Perspectives and challenges

F Sufi - Information, 2023 - mdpi.com
Utilizing social media data is imperative in comprehending critical insights on the Russia–
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …

What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey

MR Rahman, RM Hezaveh, L Williams - ACM Computing Surveys, 2023 - dl.acm.org
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …

A survey of using machine learning in IoT security and the challenges faced by researchers

KM Harahsheh, CH Chen - Informatica, 2023 - digitalcommons.odu.edu
Abstract The Internet of Things (IoT) has become more popular in the last 15 years as it has
significantly improved and gained control in multiple fields. We are nowadays surrounded by …

Process-oriented stream classification pipeline: A literature review

L Clever, JS Pohl, J Bossek, P Kerschke… - Applied Sciences, 2022 - mdpi.com
Featured Application Nowadays, many applications and disciplines work on the basis of
stream data. Common examples are the IoT sector (eg, sensor data analysis), or video …

[PDF][PDF] MoBA: Mixture of Bi-directional Adapter for Multi-modal Sarcasm Detection

Y Xie, Z Zhu, X Chen, Z Chen, Z Huang - ACM Multimedia 2024, 2024 - evfidiw.github.io
In the field of multi-modal learning, model parameters are typically large, necessitating the
use of parameter-efficient fine-tuning (PEFT) techniques. These methods have been pivotal …

[PDF][PDF] Social Media Analytics on Russia–Ukraine Cyber War with Natural Language Processing: Perspectives and Challenges. Information 2023, 14, 485

F Sufi - 2023 - academia.edu
Utilizing social media data is imperative in comprehending critical insights on the Russia–
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …

[PDF][PDF] Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: A Literature Review. Electronics 2022, 11, 3330

E Altulaihan, MA Almaiah, A Aljughaiman - 2022 - researchgate.net
The Internet of Things (IoT) interconnects physical and virtual objects embedded with
sensors, software, and other technologies, which exchange data using the Internet. This …

Employing social network analysis to dark web communities

S Nikoletos, P Raftopoulou - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Deep web refers to sites that cannot be found by search engines and makes up the 96% of
the digital world. The dark web is the part of the deep web that can only be accessed …