Cybersecurity in the AI-Based metaverse: A survey

M Pooyandeh, KJ Han, I Sohn - Applied Sciences, 2022 - mdpi.com
The Metaverse is a multi-user virtual world that combines physical reality with digital virtual
reality. The three basic technologies for building the Metaverse are immersive technologies …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

APT datasets and attack modeling for automated detection methods: A review

B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …

Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design

JBF Sequeiros, FT Chimuco, MG Samaila… - ACM Computing …, 2020 - dl.acm.org
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …

Security modeling of autonomous systems: A survey

F Jahan, W Sun, Q Niyaz, M Alam - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Autonomous systems will soon be integrating into our lives as home assistants, delivery
drones, and driverless cars. The implementation of the level of automation in these systems …

A reference model for cyber threat intelligence (CTI) systems

G Sakellariou, P Fouliras, I Mavridis, P Sarigiannidis - Electronics, 2022 - mdpi.com
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with
many organizations investing in the development of proper tools and services and the …

Railway cyber-security in the era of interconnected systems: a survey

S Soderi, D Masti, YZ Lun - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
Technological advances in the telecommunications industry have brought significant
advantages in the management and performance of communication networks. The railway …

Cyber threat intelligence from honeypot data using elasticsearch

H Almohannadi, I Awan, J Al Hamar… - 2018 IEEE 32nd …, 2018 - ieeexplore.ieee.org
Cyber attacks are increasing in every aspect of daily life. There are a number of different
technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS) …

Distributed access control on IoT ledger-based architecture

RC Lunardi, RA Michelin, CV Neu… - NOMS 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
Due to increased number of attacks on the Internet of Things (IoT) devices, the security of IoT
networks became critical. Some recent researches proposed the adoption of blockchain in …

[PDF][PDF] Effects of knowledge of cyber security on prevention of attacks

MI Al-Ghamdi - Materials Today: Proceedings, 2021 - academia.edu
It cannot be underestimated the importance of using real-world data to enable and validate
dynamic network research for cyber security purposes. Sadly, the use of real-world data for …