作者
Mazin Abed Mohammed, Abdullah Lakhan, Dilovan Asaad Zebari, Karrar Hameed Abdulkareem, Jan Nedoma, Radek Martinek, Usman Tariq, Majed Alhaisoni, Prayag Tiwari
发表日期
2023/3/1
期刊
CAAI Transactions on Intelligence Technology
简介
Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices. On the other hand, IoT‐based heartbeat digital healthcare applications have been steadily increasing in popularity. These applications make a lot of data, which they send to the fog cloud to be processed further. In healthcare networks, it is critical to examine healthcare data for malicious intent. The malware is a peace code with polymorphic and metamorphic attack forms. Existing malware analysis techniques did not find malware in the content‐aware heartbeat data. The Adaptive Malware Analysis Dynamic Machine Learning (AMDML) algorithm for content‐aware heartbeat data in fog cloud computing is …
引用总数
学术搜索中的文章
MA Mohammed, A Lakhan, DA Zebari… - CAAI Transactions on Intelligence Technology, 2023