Abstract The Internet of things (IoT) is an important technology that is highly beneficial in establishing smart items, connections and cities. However, there are worries regarding …
KJ Ferguson-Walter, MM Major, CK Johnson… - Computers & …, 2023 - Elsevier
Human behavior is a critical, yet under-studied topic in cybersecurity. Among the techniques used for cyber defense, for cyber deception, a better understanding of human perception …
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the …
S Chahal - International Journal of Science and Research, 2023 - researchgate.net
The study helps to investigate the performance of ML and AI to detect IDS using different segments. The first segment helps to inform the project aim, objective, and issues in a …
Moving target defense (MTD) and decoy strategies, measures of active defense, were introduced to secure both the proactive security and reactive adaptability of internet-of-things …
Global politics in the twenty-first century is complicated by dense economic interdependence, rapid technological innovation, and fierce security competition. How …
Starting from the nonlinear operating equations of the permanent magnet synchronous motor (PMSM) and from the global strategy of the field-oriented control (FOC), this article …
J Pateria, L Ahuja, S Som, A Seth - Int. J. Inf. Technol. Comput. Sci, 2023 - mecs-press.org
Bluff and truth are major pillars of deception technology. Deception technology majorly relies on decoygenerated data and looks for any behavior deviation to flag that interaction as an …
IT Aktolga, ES Kuru, Y Sever, P Angin - arXiv preprint arXiv:2302.13865, 2023 - arxiv.org
The rising use of microservices based software deployment on the cloud leverages containerized software extensively. The security of applications running inside containers as …