Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

[HTML][HTML] Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm

A John, IFB Isnin, SHH Madni, FB Muchtar - Intelligent Systems with …, 2024 - Elsevier
The intrusion detection system (IDS) model, which can identify the presence of intruders in
the network and take some predefined action for safe data transit across the network, is …

Attack scenario reconstruction via fusing heterogeneous threat intelligence

X Zang, J Gong, X Zhang, G Li - Computers & Security, 2023 - Elsevier
Nowadays, new-generation threats often use multiple means or perform several steps to
intrude into networks and ultimately reach their objective. These new threats have multi …

Flow based containerized honeypot approach for network traffic analysis: An empirical study

SC Sethuraman, TG Jadapalli, DPV Sudhakaran… - Computer Science …, 2023 - Elsevier
The world of connected devices has been attributed to applications that relied upon
multitude of devices to acquire and distribute data over extremely diverse networks. This …

Active lifelong anomaly detection with experience replay

K Faber, R Corizzo, B Sniezynski… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
Anomaly detection tools present the potential to enhance defense policies and protection
against different types of threats, supporting public safety and national security. Lifelong …

[HTML][HTML] A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing

P Balasubramanian, S Nazari, DK Kholgh… - Decision Analytics …, 2025 - Elsevier
The extraction of cyber threat intelligence (CTI) from open sources is a rapidly expanding
defensive strategy that enhances the resilience of both Information Technology (IT) and …

TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in the Wild

P Balasubramanian, S Nazari, DK Kholgh… - arXiv preprint arXiv …, 2024 - arxiv.org
The extraction of cyber threat intelligence (CTI) from open sources is a rapidly expanding
defensive strategy that enhances the resilience of both Information Technology (IT) and …

[HTML][HTML] Articlesfederated learning-enabled zero-day ddos attack detection scheme in healthcare 4.0

MM Salim, Y Sangthong, X Deng, JH Park - 2024 - hcisj.com
Distributed denial-of-service (DDoS) attacks are a constant threat to the security of
healthcare systems, which are vulnerable due to a lack of cyber threat intelligence and …

Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain

F Gallo-Serpillo, J Valls-Prieto - Computers in Human Behavior, 2024 - Elsevier
Gathering evidence in cybercrime is a complex process. Under this premise, it is very
important to have cutting-edge methodologies that allow the observation of criminal …