Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman… - Electronics, 2019 - mdpi.com
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on
everyday life to large industrial systems. Unfortunately, this has attracted the attention of …

Real people, virtual places, and the spaces in between

EJ Malecki - Socio-Economic Planning Sciences, 2017 - Elsevier
A sharp distinction between the virtual world and the real world continues but has become
less tenable as technology has progressed. This review paper traces some early and recent …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

Discerning novel value chains in financial malware: on the economic incentives and criminal business models in financial malware schemes

RS Van Wegberg, AJ Klievink… - European Journal on …, 2017 - Springer
Fraud with online payment services is an ongoing problem, with significant financial-
economic and societal impact. One of the main modus operandi is financial malware that …

A Methodology to Measure the “Cost” of CPS Attacks: Not all CPS Networks are Created Equal

M Rosso, L Allodi, E Zambon… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) are (connected) computer systems used to monitor and
control physical processes using digital control programs. Cyberattacks targeting CPS can …

[PDF][PDF] Enhancing intrusion detection system performance against low frequent attacks using FC-ANN algorithm

DA Salih, YA Mohamed… - Journal of Engineering …, 2023 - jestec.taylors.edu.my
The significance of network security within the contemporary corporate landscape cannot be
overemphasized. There have been other instances whereby hackers and invaders have …

Your IP Camera Can Be Abused for Payments: A Study of IoT Exploitation for Financial Services Leveraging Shodan and Criminal Infrastructures

YR Siwakoti, M Bhurtel, DB Rawat… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) devices are being abused by exploiting their vulnerabilities.
Despite the significant efforts to improve IoT security, IoT devices are still at higher risk of …

Malware detection through call system on android smartphone using vector machine method

V Wahanggara, Y Prayudi - 2015 Fourth International …, 2015 - ieeexplore.ieee.org
The current growth of the smartphone with Android operating system-based has increased
rapidly. This rapid growth has given access for certain parties to make it as a crime target …