Securing the Internet of Things: Challenges, threats and solutions
Abstract The Internet of Things (IoT) is the next technological leap that will introduce
significant improvements to various aspects of the human environment, such as health …
significant improvements to various aspects of the human environment, such as health …
Classification and analysis of malicious code detection techniques based on the APT attack
K Lee, J Lee, K Yim - Applied Sciences, 2023 - mdpi.com
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …
[HTML][HTML] Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks
NE Park, YR Lee, S Joo, SY Kim, SH Kim… - Computers and …, 2023 - Elsevier
After the COVID-19 pandemic, cyberattacks are increasing as non-face-to-face
environments such as telecommuting and telemedicine proliferate. Cyberattackers exploit …
environments such as telecommuting and telemedicine proliferate. Cyberattackers exploit …
Distributed watchdogs based on blockchain for securing industrial internet of things
JH Lee, T Kwon - Sensors, 2021 - mdpi.com
The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial
environments. Despite the promising benefits of IIoT, securely managing software updates is …
environments. Despite the promising benefits of IIoT, securely managing software updates is …
Advance persistant threat and cyber spying-the big picture, its tools, attack vectors and countermeasures
D Bhatnagar, S Som, SK Khatri - 2019 Amity International …, 2019 - ieeexplore.ieee.org
Advance persistent threat is a primary security concerns to the big organizations and its
technical infrastructure, from cyber criminals seeking personal and financial information to …
technical infrastructure, from cyber criminals seeking personal and financial information to …
Towards identifying human actions, intent, and severity of apt attacks applying deception techniques-an experiment
J Chacon, S McKeown… - … Conference on Cyber …, 2020 - ieeexplore.ieee.org
Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect
using traditional signature-and anomaly-based intrusion detection approaches. Deception …
using traditional signature-and anomaly-based intrusion detection approaches. Deception …
[PDF][PDF] Testing antivirus in linux: An investigation on the effectiveness of solutions available for desktop computers
G Raffa - 2021 - royalholloway.ac.uk
Anti-virus (AV) programs are widely recognized as one of the most important defensive tools
available for desktop computers. Regardless of this, several Linux users consider AVs …
available for desktop computers. Regardless of this, several Linux users consider AVs …
Mitigating Advanced Persistent Threats: A Comparative Evaluation Review.
Cyber threats have been an issue of great concern since the advent of the information
(computer and internet) age. But of greater concern is the most recent class of threats …
(computer and internet) age. But of greater concern is the most recent class of threats …