A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

Threat analysis and risk assessment for connected vehicles: A survey

F Luo, Y Jiang, Z Zhang, Y Ren… - Security and …, 2021 - Wiley Online Library
With the rapid development of connected vehicles, people can get a better driving
experience. However, the interconnection with the external network may bring growing …

Cybersecurity on connected and automated transportation systems: A survey

A Abdo, H Chen, X Zhao, G Wu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Connected and automated vehicles (CAVs) provide various valuable and advanced
services to manufacturers, owners, mobility service providers, and transportation authorities …

Towards adaptive cybersecurity for green IoT

T Halabi, M Bellaiche, BCM Fung - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) paradigm has led to an explosion in the number of IoT devices
and an exponential rise in carbon footprint incurred by overburdened IoT networks and …

Recent developments in game-theory approaches for the detection and defense against advanced persistent threats (APTs): a systematic review

MNA Khalid, AA Al-Kadhimi, MM Singh - Mathematics, 2023 - mdpi.com
Cybersecurity has become a prominent issue in regard to ensuring information privacy and
integrity in the internet age particularly with the rise of interconnected devices. However …

HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT

K Saurabh, V Sharma, U Singh, R Khondoker… - Arabian Journal for …, 2024 - Springer
Abstract Critical Industries such as Manufacturing, Power, and Intelligent Transportation are
increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter …

Agreement-induced data verification model for securing vehicular communication in intelligent transportation systems

PM Kumar, C Konstantinou, S Basheer… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Intelligent Transportation security requires cooperative credentials for sharing navigation
and communication data between the vehicles. However due to the dynamic environment …

Defense for advanced persistent threat with inadvertent or malicious insider threats

Z Chen, G Chen, Y Hong - arXiv preprint arXiv:2209.08476, 2022 - arxiv.org
In this paper, we propose a game-theoretical framework to investigate advanced persistent
threat problems with two types of insider threats: malicious and inadvertent. Within this …

Equipment classification based differential game method for advanced persistent threats in Industrial Internet of Things

C Gan, J Lin, DW Huang, Q Zhu, L Tian… - Expert Systems with …, 2024 - Elsevier
This paper is dedicated to solving the problem of Advanced Persistent Threat (APT) attack
and defense in the Industrial Internet of Things (IIoT). Due to the diversity of IIoT equipment …

[HTML][HTML] Bayesian stackelberg game approach for cyber mission impact assessment

D Lee, D Kim, MK Ahn, S Lee - ICT Express, 2024 - Elsevier
Cyber threats increasingly target mission-critical systems in the military and private sectors.
CMIA has emerged to mitigate such cyber threats and assure the resilience of critical …