A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data Science for the Internet of Things
2020
IEEE Internet of Things Journal
He has been involved in research and development projects in the research areas of the Internet of Things, smart environments, data science, and mobile applications. Dr. ...
., Treviso, Italy, an innovative startup company whose mission is the development of innovative systems and services based on IoT technology for cultural heritage. ...
The article titled "Countering malicious URLs in Internet of Things using a knowledge-based approach and a simulated expert" proposes a novel methodology to detect malicious URLs using a simulated expert ...
doi:10.1109/jiot.2020.2985598
fatcat:6rmpgcitjbbmdkctvhirzxxk3q
The Current Phishing Techniques – Perspective of the Nigerian Environment
2021
World Journal of Innovative Research
Often the numerical data can be used as fetched or stored as Bag-of-words (a dictionary made of words that appear in a URL and used as a feature) approach. ...
Their work reviewed machine learning techniques already in use and they proposed systematic formulation of Malicious URL for machine learning approach as well as addressing feature representation and designing ...
doi:10.31871/wjir.10.1.9
fatcat:3kfhm2uevrap3bwukrpaav74l4
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
[chapter]
2005
Lecture Notes in Computer Science
of a secure SSL/TLS connection and make them disclose secrets to attackers. ...
Today the standard means for secure transactions in the World Wide Web (WWW) are the SSL/TLS protocols, which provide secure (i.e., private and authentic) channels between browsers and servers. ...
Recent studies [9, 10] show a strongly increasing number of VS attacks in the Internet, because, in contrast to buffer-overflow attacks, VS attacks do not require sophisticated expert knowledge of operating ...
doi:10.1007/978-3-540-31979-5_18
fatcat:wljrn566jnarndsjjhjwlksf6u
The Vulnerabilities of Trusted Notifier-Models in Russia: The Case of Netoscope
2021
Media and Communication
Zooming in on the use of trusted notifier-models to counter online harms in Russia, we examine the Netoscope project (a database of Russian domain names suspected of malware, botnet, or phishing activities ...
We argue that, in the absence of effective legal safeguards and transparency requirements, the politicised nature of internet infrastructure makes the trusted notifier-model vulnerable to abuse in authoritarian ...
Acknowledgments The authors would like to thank Mykola Makhortykh and two anonymous reviewers for their insightful comments. ...
doi:10.17645/mac.v9i4.4237
fatcat:354rcntvazdmtmte5freiwr2py
Research Methodology on Web Mining for Malware Detection
English
2014
International Journal of Computer Trends and Technology
English
The proposed web mining methodology uses web structure mining, using graph mining for malware detection with a case study proposed on cloud mining. ...
In this review paper we want to discuss Research Methodology on Web mining for Malware detection. ...
One input is its knowledge of the malicious behavior. In anomaly-based detection, the inverse of this knowledge comes from the learning phase. ...
doi:10.14445/22312803/ijctt-v12p131
fatcat:tt4nfblmhfb43a5a5j7hrew2pm
Serious Games for Cyber Security Education
[article]
2016
arXiv
pre-print
The elements of a game design framework for avoiding phishing attacks were used to address the game design issues. ...
The study results showed a significant improvement of participants' phishing avoidance behaviour in their post-test assessment. ...
The first study used a quantitative approach and both quantitative and qualitative approaches were used in in the second. ...
arXiv:1610.09511v1
fatcat:u23ow7jhrza23pqcbl6dsbdc4y
Testing And Hardening IoT Devices Against the Mirai Botnet
2020
2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufactures, and are vulnerable ...
A combination of software assets not being utilised safely and effectively are exposing consumers to a full compromise. We configured and attacked 4 different IoT devices using the Mirai libraries. ...
A litany of security flaws and vulnerabilities make devices in the Internet of Things prime targets for exploitation by malware. ...
doi:10.1109/cybersecurity49315.2020.9138887
dblp:conf/cybersecpods/KellyPML20
fatcat:pzj37t773ffcnkyfggeujvr4ee
Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic – A Review of Literature
2020
Zenodo
This survey aims to tackle Trust, Protection, identification and activity on wide scale networks and Internet of Things. ...
Furthermore, as the Internet of Things (IoT) has arisen, the number of Internetconnected devices is increasingly growing and being an easy target of cyber-attacks. ...
This is a groundbreaking way of monitoring malicious behaviour in terms of DDoS and Ransomware cyber threats using deep learning techniques. ...
doi:10.5281/zenodo.3978912
fatcat:u6dcenmygvcjpbtveyc7rbfyl4
Intelligent Techniques for Detecting Network Attacks: Review and Research Directions
2021
Sensors
The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. ...
to counter current and future network attacks. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s21217070
pmid:34770375
pmcid:PMC8587628
fatcat:tnedw4hhcze7foqps3jfpiog7u
Analysis and Findings of Social Engineering Industry Experts Explorative Interviews: Perspectives on Measures, Tools and Solutions
2020
IEEE Access
The findings build upon the researchers' ongoing work, which postulates that as an increase in contextual social engineering knowledge leads to a decrease in being victims of social engineering and is, ...
In the context of cyber security, social engineering is the practice of taking advantage of human weaknesses through manipulation to accomplish a malicious goal. ...
Aldulaijan, GNS General Manager, for sharing his pearls of wisdom with us during the course of this research. ...
doi:10.1109/access.2020.2983280
fatcat:l5qyhrtnvrge3nwrs6bh5nfboi
Detecting cyber threats through social network analysis: short survey
2017
SocioEconomic Challenges
Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are ...
This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. ...
To identify experts in social networks, for example, approach of ant colony optimization (ACO) is used. ...
doi:10.21272/sec.2017.1-03
fatcat:m7wj7om4o5hthluqblwcpcbmni
Detecting cyber threats through social network analysis: short survey
[article]
2018
arXiv
pre-print
Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are ...
This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. ...
To identify experts in social networks, for example, approach of ant colony optimization (ACO) is used. ...
arXiv:1805.06680v1
fatcat:iqdtg73oovgaxeupdovfk4valy
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity
2020
IEEE Access
Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat ...
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions which helped us improve the content, quality, and presentation of this paper. ...
doi:10.1109/access.2020.2968045
fatcat:tb6xkdqqhfcahb5soip66x5qce
A Survey on Ethical Hacking: Issues and Challenges
[article]
2021
arXiv
pre-print
In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap. ...
Therefore, in order to resist unknown vulnerabilities, a new kind of modern penetration tests is required, in addition to reinforcing the use of shadows honeypots. ...
PENTOS, or "Penetration Testing Tool for Internet of Thing Devices" was presented by the Visoottiviseth et al. in [243] . ...
arXiv:2103.15072v1
fatcat:kqj6isalovdzbald3w2kxnqhbe
Systematic Literature Review over IDPS, Classification and Application in its Different Areas
2021
STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH
In this Survey paper focuses on Classifying various kinds of IDS with the major types of attacks based on intrusion methods. ...
Presenting a classification of network anomaly IDS evaluation metrics and discussion on the importance of the feature selection. ...
In an expert system, the rules are generally defined manually by a knowledge engineer working in collaboration with an expert in the field (Kenkre et al., 2015) . ...
doi:10.52700/scir.v3i2.58
fatcat:xrczlxjg5ncclf2ftxyw3y5zce
« Previous
Showing results 1 — 15 out of 542 results