Application Layer Cyber Deception without Developer Interaction

M Kahlhofer, S Rass - arXiv preprint arXiv:2405.12852, 2024 - arxiv.org
Cyber deception techniques that are tightly intertwined with applications pose significant
technical challenges in production systems. Security measures are usually the responsibility …

Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS

W Alhakami - Plos one, 2024 - journals.plos.org
The persistent evolution of cyber threats has given rise to Gen V Multi-Vector Attacks,
complex and sophisticated strategies that challenge traditional security measures. This …

[HTML][HTML] Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments

AM Escolar, Q Wang, JMA Calero - Journal of Network and Computer …, 2024 - Elsevier
Abstract Internet of Things (IoT) coupled with 5G and upcoming pre-6G networks will provide
the scalability and performance required to deploy a wide range of new digital services in …

Encryption as a Service: A Review of Architectures and Taxonomies

A Javadpour, F Ja'fari, T Taleb - IFIP International Conference on …, 2024 - Springer
Due to the rise of Internet of Things networks, targeting vulnerabilities related to the limitation
of resources in devices has increased. Therefore, it is necessary to delegate encryption …

Transfer learning based multi-class malware classification using VGG16 feature extractor and SVM classifier

H Saggu, EK Singh, TNS Babu - 2024 10th International …, 2024 - ieeexplore.ieee.org
Malicious programs are becoming a severe problem in today's internet-connected world.
Several works have explored image analysis-based malware detection in recent years. The …

Generation and Deployment of Honeytokens in Relational Databases for Cyber Deception

N Prabhaker, GS Bopche, M Arock - Available at SSRN 4827562 - papers.ssrn.com
The advancement in Information and Communication Technologies has increased data
security concerns handled by organizations and government entities. Despite considerable …