Diversity-based security approaches have been studied for several decades since the 1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …
J Geremias, EK Viegas, AO Santin… - 2022 International …, 2022 - ieeexplore.ieee.org
Over the last years, several works have proposed highly accurate Android malware detection techniques. Surprisingly, modern malware apps can still pave their way to official …
Abstract The Internet of Things (IoT) has become increasingly prevalent in various aspects of our lives, enabling billions of devices to connect and communicate seamlessly. However …
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted …
The deployment of container-based services continues to increase as time passes, mainly due to its fast provision time and lower allocation overheads. Yet, the literature still neglects …
J Geremias, EK Viegas, AO Santin… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
The number of Android malicious applications keeps growing as time passes, even paving their way to official app markets. In recent years, a promising malware detection approach …
Current machine learning techniques for network-based intrusion detection cannot handle the evolving behavior of network traffic, requiring periodic model updates to be conducted …
PR de Oliveira, AO Santin… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Industrial Control Systems (ICS) play a crucial role in managing and controlling industrial assets. Due to their critical importance, adversaries are often highly motivated to target these …
The emergence of industrial Cyberinfrastructures, the development of information communication technology in industrial fields, and the remote accessibility of automated …