[HTML][HTML] Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges

M Benmalek - Internet of Things and Cyber-Physical Systems, 2024 - Elsevier
Ransomware attacks have emerged as one of the most significant cyberthreats faced by
organizations worldwide. In recent years, ransomware has also started to target critical …

[HTML][HTML] Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness

M Alawida, B Abu Shawar, OI Abiodun, A Mehmood… - Information, 2024 - mdpi.com
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful
generative AI model that can simulate human-like dialogues across a variety of domains …

GDLS-FS: scaling feature selection for intrusion detection with GRASP-FS and distributed local search

EFC Silva, N Naves, SE Quincozes… - … conference on advanced …, 2023 - Springer
This paper presents a scalable microservice-oriented architecture, called Distributed LS
(DLS), for enhancing the Local Search (LS) phase in the Greedy Randomized Adaptive …

[HTML][HTML] Unveiling the Landscape of Operating System Vulnerabilities

M Bhurtel, DB Rawat - Future Internet, 2023 - mdpi.com
Operating systems play a crucial role in computer systems, serving as the fundamental
infrastructure that supports a wide range of applications and services. However, they are …

Vulnerabilities of Windows systems through Wi-Fi infrastructure

M Popescu, C Capotă, I Țene… - Advanced Topics in …, 2023 - spiedigitallibrary.org
The purpose of this paper is to validate the existence of vulnerabilities in computer networks-
wireless networks which have in their architecture Windows operating systems. In order to …

[PDF][PDF] Internet of Things and Cyber-Physical Systems

M Benmalek - networks - researchgate.net
Ransomware attacks have emerged as one of the most significant cyberthreats faced by
organizations worldwide. In recent years, ransomware has also started to target critical …

Microserviços para geração de RCLS no GRASP-FS: Uma abordagem escalável para seleção de atributos em IDSs industriais

NNR Faria - 2023 - repositorio.ufu.br
Este trabalho apresenta uma arquitetura escalável orientada a microsserviços, chamada
Distributed RCL Generator (DRG), para desacoplar e paralelizar a fase de construção na …

[PDF][PDF] Tackling Security Challenges in Operating Systems Using Selective Symbolic Execution DISSERTATION

Y Liu - 2022 - www-test.ics.uci.edu
The Operating System (OS) provides the fundamental mechanisms to support all kinds of
applications on computing devices like personal laptops and smartphones. It powers almost …

[PDF][PDF] Operating Systems Vulnerability-An Examination of Windows 10, macOS, and Ubuntu from 2015 to

J Softić, Z Vejzović - academia.edu
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS,
and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for …

[PDF][PDF] WHAT'S UNDER THE HOOD? ROOT CAUSE AND PATCH ANALYSES OF ELEVATION OF PRIVILEGE VULNERABILITIES IN THE WINDOWS OPERATING …

LLY Amy, PTB Bryan, Y Ni - dsta.gov.sg
The Windows operating system implements many access control techniques 1 in order to
ensure its integrity, confidentiality and availability. Despite these access control techniques …