[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention

M Humayun, NZ Jhanjhi, A Alsayat… - Egyptian Informatics …, 2021 - Elsevier
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …

Malicious application detection in android—a systematic literature review

T Sharma, D Rattan - Computer Science Review, 2021 - Elsevier
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …

IoT malware detection architecture using a novel channel boosted and squeezed CNN

M Asam, SH Khan, A Akbar, S Bibi, T Jamal, A Khan… - Scientific Reports, 2022 - nature.com
Interaction between devices, people, and the Internet has given birth to a new digital
communication model, the internet of things (IoT). The integration of smart devices to …

[HTML][HTML] A new deep boosted CNN and ensemble learning based IoT malware detection

SH Khan, TJ Alahmadi, W Ullah, J Iqbal, A Rahim… - Computers & …, 2023 - Elsevier
Security issues are threatened in various types of networks, especially in the Internet of
Things (IoT) environment that requires early detection. IoT is the network of real-time devices …

Automated malware detection in mobile app stores based on robust feature generation

M Alazab - Electronics, 2020 - mdpi.com
Many Internet of Things (IoT) services are currently tracked and regulated via mobile
devices, making them vulnerable to privacy attacks and exploitation by various malicious …

MaliCage: A packed malware family classification framework based on DNN and GAN

X Gao, C Hu, C Shan, W Han - Journal of Information Security and …, 2022 - Elsevier
To evade security detection, hackers always add a deceptive packer outside of the original
malicious codes. The coexistence of original unpacked samples and packed samples of …

Mitigating malicious adversaries evasion attacks in industrial internet of things

H Rafiq, N Aslam, U Ahmed… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With advanced 5G/6G networks, data-driven interconnected devices will increase
exponentially. As a result, the Industrial Internet of Things (IIoT) requires data secure …

Cyber attacks in the era of covid-19 and possible solution domains

IC Eian, LK Yong, MYX Li, YH Qi, Z Fatima - 2020 - preprints.org
In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially.
The number of people doing online activities such as e-learning, remote working, online …

Down2Park: Finding New Ways to Park

S Balakrishnan, B Ruskhan, LW Zhen… - Journal of Survey …, 2023 - sifisheriessciences.com
The purpose of this article is to investigate the problems regarding the time spent in traffic
and the proper measures that can be taken to decrease the time spent in traffic. The report …

The role of IoT in digital governance

A Khan, NZ Jhanjhi, M Humayun… - … Recent Technologies for …, 2020 - igi-global.com
The acronym IoT stands for internet of things. The IoT ecosystem can be envisioned as a set
of physical electronic devices embedded with intelligence, connected through a network …