Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

Traffic based sequential learning during botnet attacks to identify compromised iot devices

E Gelenbe, M Nakıp - IEEE Access, 2022 - ieeexplore.ieee.org
A novel online Compromised Device Identification System (CDIS) is presented to identify IoT
devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources …

[HTML][HTML] Improving massive access to IoT gateways

E Gelenbe, M Nakıp, T Czachórski - Performance Evaluation, 2022 - Elsevier
IoT networks handle incoming packets from large numbers of IoT Devices (IoTDs) to IoT
Gateways. This can lead to the IoT Massive Access Problem that causes buffer overflow …

Investigation of microservice-based workflow management solutions for industrial automation

JG Represa, F Larrinaga, P Varga, W Ochoa, A Perez… - Applied Sciences, 2023 - mdpi.com
In an era ruled by data and information, engineers need new tools to cope with the
increased complexity of industrial operations. New architectural models for industry enable …

Review of some recent european cybersecurity research and innovation projects

M Çağlayan - Infocommunications Journal, 2022 - avesis.yasar.edu.tr
This paper reviews research from several EU Projects that have addressed cybersecurity
using techniques based on Machine Learning, including the security of Mobile Networks …

G-networks can detect different types of cyberattacks

E Gelenbe, M Nakɩp - 2022 30th International Symposium on …, 2022 - ieeexplore.ieee.org
Malicious network attacks are a serious source of concern, and machine learning
techniques are widely used to build Attack Detectors with off-line training with real attack and …

Autonomous Vehicle Development as a System of Systems and Constituent Systems Networking

A Elhadeedy, J Daily - 2024 IEEE International Systems …, 2024 - ieeexplore.ieee.org
Driverless vehicles are complex to develop due to the number of systems required for safe
and secure autonomous operation. Autonomous vehicles embody the definition of a system …

[PDF][PDF] Holistic attack methods against power systems using the IEC 60870-5-104 protocol

J Csatár, G Péter, T Holczer - Infocommunications Journal, 2023 - real.mtak.hu
IEC 60870-5-104 is a widely used protocol for telecontrol in European power systems.
However, security was not a design goal when it was originally published: This protocol …

Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud

V K. Soman, V Natarajan - IET Information Security, 2024 - Wiley Online Library
The data transmission and data retrieval process from the cloud is a critical issue because of
cyber‐attacks. The data in the cloud is highly vulnerable and may fall prey to hackers. The …

Dynamic Distributed Monitoring for 6LoWPAN-based IoT Networks

B Mostafa, M Molnar, M Saleh, A Benslimane… - …, 2023 - real.mtak.hu
Mission-criticalal Internet of Things (IoT)-based networks are increasingly employed in daily
and industrial infrastructures. The resilience of such networks is crucial. Given IoT networks' …