A survey on conflict detection in iot-based smart homes

B Huang, D Chaki, A Bouguettaya, KY Lam - ACM Computing Surveys, 2023 - dl.acm.org
As the adoption of IoT-based smart homes continues to grow, the importance of addressing
potential conflicts becomes increasingly vital for ensuring seamless functionality and user …

Deep learning methods for malware and intrusion detection: A systematic literature review

R Ali, A Ali, F Iqbal, M Hussain… - Security and …, 2022 - Wiley Online Library
Android and Windows are the predominant operating systems used in mobile environment
and personal computers and it is expected that their use will rise during the next decade …

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic

M Nobakht, R Javidan, A Pourebrahimi - Evolving Systems, 2023 - Springer
Malware detection has recently emerged as a significant challenge on the Internet of Things
(IoT) security domain. Due to the increasing complexity and variety of malware, the demand …

Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network

B Swathi, SS Kolisetty, GV Sivanarayana, SR Battula - Cluster Computing, 2024 - Springer
Traditional network administration required manual programming of routing policies and
related parameters on specific routers and switches, which was expensive. Therefore …

[PDF][PDF] An Evaluation of Current Malware Trends and Defense Techniques: A Scoping Review with Empirical Case Studies

A Cletus, AA Opoku, BA Weyori - Journal of Advances in Information …, 2024 - jait.us
1 Department of Computer Science and Informatics, University of Energy and Natural
Resources, Sunyani, Ghana 2 Department of Mathematics and ICT, St. John Boscos College …

Correctness of IoT-based systems: From a DSL to a mechanised analysis

C Attiogbé, J Rocheteau - Journal of Computer Languages, 2023 - Elsevier
Abstract Systems based on the Internet of Things are being widely used in industrial areas
such as smart manufacturing, in smart health monitoring, in entertainment and in home …

[HTML][HTML] Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms

SK Henge, GU Maheswari, R Ramalingam… - Systems, 2023 - mdpi.com
This article discusses the importance of cross-platform UX/UI designs and frameworks and
their effectiveness in building web applications and websites. Third-party libraries (TPL) and …

Architectural invariants and correctness of iot-based systems

C Attiogbé, J Rocheteau - International Conference on Model and Data …, 2022 - Springer
Abstract Systems based on the Internet of Things impact more and more industrial areas
such as smart manufacturing, smart health monitoring and home automation. Ensuring their …

Integrating of rule based secure parameters for analyzing third-party applications and libraries in cross platform development

SK Henge, P Dhiman - AIP Conference Proceedings, 2023 - pubs.aip.org
The cross platform UX/UI designs, frameworks will attain the targeted spectators rapidly
since they are wellsuited with numerous operating systems and devices. The greater part of …