Zobrazeno 1 - 10
of 232
pro vyhledávání: '"IoT malware"'
Autor:
Siraj Uddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Ahsan Nazir, Ahsan Wajahat, Faheem Ullah, Abdul Wadud
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 8, Pp 102164- (2024)
The swift proliferation of Internet of Things (IoT) devices has presented considerable challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract malware attacks, necessitating advanced detection and forensic analysi
Externí odkaz:
https://doaj.org/article/2b08b72ae1704c03b711fe3cb300bf51
Autor:
Maina Bernard Mwangi, Shin-Ming Cheng
Publikováno v:
IEEE Access, Vol 12, Pp 185172-185186 (2024)
The integration of machine learning (ML) has revolutionized malware detection, enabling accurate identification of subtle distinctions between malware and benignware. As the threat landscape continually evolves and new malware strains emerge, convent
Externí odkaz:
https://doaj.org/article/b8503cfc90a044b5a83661e992071d90
Autor:
Son Pham Anh, Yasuhiro Nakamura
Publikováno v:
IEEE Access, Vol 12, Pp 103789-103809 (2024)
In recent years, with the advancement of information technology and digital transformation, the number of IoT devices has been rapidly increasing. Despite efforts to raise awareness and encourage users to enhance security for these IoT devices, a lar
Externí odkaz:
https://doaj.org/article/9ac613319a1e46f6a579a69cc3b6b0b2
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 1, Pp 101898- (2024)
With the proliferation of malware on IoT devices, research on IoT malicious code has also become more mature. Most studies use learning models to detect or classify malware. Therefore, ensuring high-quality labels for malware samples is crucial to ma
Externí odkaz:
https://doaj.org/article/a9e94528b02e4aa09a8aaf6a7b8eef3c
Autor:
Gasim Alandjani
Publikováno v:
Applied Sciences, Vol 14, Iss 11, p 4645 (2024)
Detecting malware is a crucial defense mechanism against potential cyber-attacks. However, current methods illustrate significant limitations in achieving high performance while maintaining faster inference on edge devices. This study proposes a nove
Externí odkaz:
https://doaj.org/article/89a5e0640a764d2c945fa3c032fabbdf
Publikováno v:
IEEE Access, Vol 11, Pp 18855-18867 (2023)
Technology advancements have led to the use of millions of IoT devices. However, IoT devices are being exploited as an entry point due to security flaws by resource constraints. IoT malware is being discovered in a variety of types. The purpose of th
Externí odkaz:
https://doaj.org/article/3f380faf63e14da18efcbd349b9c9a13
Publikováno v:
IEEE Access, Vol 11, Pp 8240-8253 (2023)
With the development of IoT devices, there is a rapid increase in new types of IoT malware and variants, causing social problems. The malware’s phylogenetic tree has been used in many studies for malware clustering or better understanding of malwar
Externí odkaz:
https://doaj.org/article/6d106bc6fbe343768337ee0142d27fb3
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9867-9888 (2022)
IoT devices which include wireless sensors, software, actuators, and computer devices operated through the Internet, enable the transfer of data among objects or people automatically without human intervention. Since these devices are resource constr
Externí odkaz:
https://doaj.org/article/ec496e7691ec40aea5fad2284fc47122
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.