Iot-based android malware detection using graph neural network with adversarial defense

R Yumlembam, B Issac, SM Jacob… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Since the Internet of Things (IoT) is widely adopted using Android applications, detecting
malicious Android apps is essential. In recent years, Android graph-based deep learning …

Understanding iot security from a market-scale perspective

X Jin, S Manandhar, K Kafle, Z Lin… - Proceedings of the 2022 …, 2022 - dl.acm.org
Consumer IoT products and services are ubiquitous; yet, a proper characterization of
consumer IoT security is infeasible without an understanding of what IoT products are on the …

Aot-attack on things: A security analysis of iot firmware updates

M Ibrahim, A Continella… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
IoT devices implement firmware update mechanisms to fix security issues and deploy new
features. These mechanisms are often triggered and mediated by mobile companion apps …

The convergence of artificial intelligence and blockchain: the state of play and the road ahead

D Bhumichai, C Smiliotopoulos, R Benton… - Information, 2024 - mdpi.com
Artificial intelligence (AI) and blockchain technology have emerged as increasingly
prevalent and influential elements shaping global trends in Information and …

[HTML][HTML] A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset

E Chatzoglou, V Kouliaridis, G Kambourakis… - Computers & …, 2023 - Elsevier
Following QUIC protocol ratification on May 2021, the third major version of the Hypertext
Transfer Protocol, namely HTTP/3, was published around one year later in RFC 9114. In …

On the data privacy, security, and risk postures of IoT mobile companion Apps

S Neupane, F Tazi, U Paudel, FV Baez… - IFIP Annual Conference …, 2022 - Springer
Abstract Most Internet of Things (IoT) devices provide access through mobile companion
apps to configure, update, and control the devices. In many cases, these apps handle all …

Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications

A Surani, A Bawaked, M Wheeler, B Kelsey… - IFIP Annual Conference …, 2023 - Springer
In the wake of the COVID-19 pandemic, a rapid digital transformation has taken place in the
mental healthcare sector, with a marked shift towards telehealth services on web and mobile …

[HTML][HTML] Image-to-Image Translation-Based Deep Learning Application for Object Identification in Industrial Robot Systems

TI Erdei, TP Kapusi, A Hajdu, G Husi - Robotics, 2024 - mdpi.com
Industry 4.0 has become one of the most dominant research areas in industrial science
today. Many industrial machinery units do not have modern standards that allow for the use …

Vulnerabilities in IoT devices, backends, applications, and components

R Kaksonen, K Halunen, J Röning - Proceedings of the 9th …, 2023 - oulurepo.oulu.fi
Abstract The Internet of Things (IoT) is the ecosystem of networked devices encountered in
both work and home. IoT security is a great concern and vulnerabilities are reported daily …

On Quantifying of IoT Security Parameters-An Assessment Framework

SA Ebad - IEEE Access, 2023 - ieeexplore.ieee.org
Several attempts have been made to propose metrics that quantify the parameters of
existing solutions to improve the security of IoT systems. This paper presents a framework to …