DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification

J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and
defensing cyber crimes. Although notable research efforts have been dedicated to …

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild

MS Pour, A Mangino, K Friday, M Rathbun… - Computers & …, 2020 - Elsevier
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in
consumer and critical infrastructures. The highly heterogeneous nature of IoT devices and …

Systematic literature review on cyber situational awareness visualizations

L Jiang, A Jayatilaka, M Nasim, M Grobler… - Ieee …, 2022 - ieeexplore.ieee.org
The dynamics of cyber threats are increasingly complex, making it more challenging than
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …

Governance of cybersecurity-the case of South Africa

E Sutherland - The African Journal of Information and Communication, 2017 - scielo.org.za
Cybersecurity is a growing concern for governments, with the push for universal access to
the Internet, the increasing ubiquity of social networks and the growing reliance on digital …

A survey on cyber situation-awareness systems: Framework, techniques, and insights

H Alavizadeh, J Jang-Jaccard, SY Enoch… - ACM Computing …, 2022 - dl.acm.org
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that
are equipped with novel approaches to learn the system and propagate themselves, such as …

[PDF][PDF] Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.

C Fachkha, E Bou-Harb, A Keliris, ND Memon… - NDSS, 2017 - ndss-symposium.org
Although the security of Cyber-Physical Systems (CPS) has been recently receiving
significant attention from the research community, undoubtedly, there still exists a substantial …

Darkweb research: Past, present, and future trends and mapping to sustainable development goals

R Rama, VK Nair, P Nedungadi, I Ray, K Achuthan - Heliyon, 2023 - cell.com
The Darkweb, part of the deep web, can be accessed only through specialized computer
software and used for illegal activities such as cybercrime, drug trafficking, and exploitation …

Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns

MS Pour, E Bou-Harb, K Varma, N Neshenko… - Digital …, 2019 - Elsevier
The resource-constrained and heterogeneous nature of Internet-of-Things (IoT) devices
coupled with the placement of such devices in publicly accessible venues complicate efforts …

Wf-transformer: Learning temporal features for accurate anonymous traffic identification by using transformer networks

Q Zhou, L Wang, H Zhu, T Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Website Fingerprinting (WF) is a network traffic mining technique for anonymous traffic
identification, which enables a local adversary to identify the target website that an …

DarkVec: Automatic analysis of darknet traffic with word embeddings

L Gioacchini, L Vassio, M Mellia, I Drago… - Proceedings of the 17th …, 2021 - dl.acm.org
Darknets are passive probes listening to traffic reaching IP addresses that host no services.
Traffic reaching them is unsolicited by nature and often induced by scanners, malicious …