Zobrazeno 1 - 10
of 51
pro vyhledávání: '"Vinay Sachidananda"'
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 6, Iss 20 (2019)
Internet of Things (IoT) exposes various vulnerabilities at different levels. One such exploitable vulnerabilityis Denial of Service (DoS). In this work, we focus on a large-scale extensive study of various forms of DoS and how it can be exploited in
Externí odkaz:
https://doaj.org/article/d3a34af1674943b587fe58dad460d1b8
Autor:
Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783031255373
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e271538d8c7b4e4ff6e001b251b6418d
https://doi.org/10.1007/978-3-031-25538-0_28
https://doi.org/10.1007/978-3-031-25538-0_28
Autor:
Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy
Publikováno v:
2022 19th Annual International Conference on Privacy, Security & Trust (PST).
Autor:
Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran, Mohan Gurusamy
Publikováno v:
Information and Communications Security ISBN: 9783031157769
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9d10eb409845946b5532240206eae82e
https://doi.org/10.1007/978-3-031-15777-6_23
https://doi.org/10.1007/978-3-031-15777-6_23
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach
Autor:
Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy
Publikováno v:
Information and Communications Security ISBN: 9783031157769
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::84f9c9949db304a57b9817aa567cf9e2
https://doi.org/10.1007/978-3-031-15777-6_29
https://doi.org/10.1007/978-3-031-15777-6_29
Publikováno v:
IEEE Internet of Things Journal. 6:10773-10785
The smart home is one of the most prominent applications in the paradigm of the Internet of Things (IoT). While, it has added a level of comfort and convenience to our everyday life, at the same time, it brings a unique security challenge of mitigati
Autor:
Michael Bohadana, Yuval Elovici, Yair Meidan, Suhas Bhairav, Vinay Sachidananda, Shachar Siboni, Asaf Shabtai, Yael Mathov
Publikováno v:
IEEE Transactions on Reliability. 68:23-44
The Internet of Things (IoT) is a global ecosystem of information and communication technologies aimed at connecting any type of object (thing), at any time, and in any place, to each other and to the Internet. One of the major problems associated wi
Publikováno v:
Computers & Security. 119:102759
Publikováno v:
SAC
Internet of Things (IoT) exposes various vulnerabilities at the software level. In this paper, we propose a static analysis framework for IoT. The proposed framework is designed for detecting security vulnerabilities such as Buffer Overflow, Memory L
Publikováno v:
Computers & Security
Telecommunication service providers (telcos) are exposedto cyber-attacks executed by compromised IoT devicesconnected to their customers’ networks. Such attacks mighthave severe effects on the attack target, as well as the telcosthemselves. To miti