A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives

A Rahman, K Hasan, D Kundu, MJ Islam… - Future Generation …, 2023 - Elsevier
The individual and integration use of the Internet of Things (IoT), Information-Centric
Networking (ICN), and Federated Learning (FL) have recently been used in several network …

Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection

A Odeh, A Abu Taleb - Applied Sciences, 2023 - mdpi.com
Cybersecurity finds widespread applications across diverse domains, encompassing
intelligent industrial systems, residential environments, personal gadgets, and automobiles …

Modeling the development of energy network software, taking into account the detection and elimination of vulnerabilities

I Kotenko, K Izrailov, M Buinevich, I Saenko, R Shorey - Energies, 2023 - mdpi.com
This paper solves the problem of modeling the scheme for developing software systems,
which can be used in building solutions for secure energy networks. A development scheme …

Security in the internet of things application layer: requirements, threats, and solutions

M Abbasi, M Plaza-Hernández, J Prieto… - IEEE …, 2022 - ieeexplore.ieee.org
Communication systems and networks are evolving as an integral part of not only of our
everyday life but also as a part of the industry, fundamental infrastructures, companies, etc …

A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

Multidomain blockchain-based intelligent routing in UAV-IoT networks

A Aldaej, M Atiquzzaman, TA Ahanger… - Computer …, 2023 - Elsevier
Abstract The culmination of Unmanned Aerial Vehicle (UAV) and Internet of Things (IoT) is
being utilized considerably in a wide industrial domain due to the development of 5G …

The possibility of combining and implementing deep neural network compression methods

B Predić, U Vukić, M Saračević, D Karabašević… - Axioms, 2022 - mdpi.com
In the paper, the possibility of combining deep neural network (DNN) model compression
methods to achieve better compression results was considered. To compare the advantages …

[HTML][HTML] Моделирование программы с уязвимостями с позиции эволюции ее представлений. Часть 1. Схема жизненного цикла

КЕ Израилов - Труды учебных заведений связи, 2023 - cyberleninka.ru
Изложены результаты исследования процесса создания программ и возникающих при
этом уязвимостей. В первой части цикла статей предлагается графическая схема …