Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

Machine-learning-based darknet traffic detection system for IoT applications

Q Abu Al-Haija, M Krichen, W Abu Elhaija - Electronics, 2022 - mdpi.com
The massive modern technical revolution in electronics, cognitive computing, and sensing
has provided critical infrastructure for the development of today's Internet of Things (IoT) for a …

A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review

G Cascavilla, DA Tamburri, WJ Van Den Heuvel - Computers & Security, 2021 - Elsevier
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is
increasing exponentially. To offer an overview of the techniques and indicators to perform …

Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges

N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …

Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning

A Habibi Lashkari, G Kaur, A Rahali - Proceedings of the 2020 10th …, 2020 - dl.acm.org
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …

Target detection of forward-looking sonar image based on improved YOLOv5

H Zhang, M Tian, G Shao, J Cheng, J Liu - IEEE Access, 2022 - ieeexplore.ieee.org
Forward-looking sonar is a commonly used underwater detection device at present, but the
detection accuracy is poor due to the complex underwater environment, small target …

DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification

J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and
defensing cyber crimes. Although notable research efforts have been dedicated to …