Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by developing advanced cyber weapons. They have equipped with the most advanced …
Despite decades of research in network traffic analysis and incredible advances in artificial intelligence, network intrusion detection systems based on machine learning (ML) have yet …
In recent years, the number and variety of malicious mobile apps have increased drastically, especially on Android platform, which brings insurmountable challenges for malicious app …
In the evolving landscape of cybersecurity, the detection of Advanced Persistent Threats (APTs) remains a formidable challenge, where conventional methods often falter in the …
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
Context One of the main targets of cyber-attacks is data exfiltration, which is the leakage of sensitive or private data to an unauthorized entity. Data exfiltration can be perpetrated by an …
B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more prominent. In order to test these methods properly, it is crucial to have a suitable dataset …
One of the most common and critical destructive attacks on the victim system is the advanced persistent threat (APT)-attack. An APT attacker can achieve its hostile goal …