With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in …
B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more prominent. In order to test these methods properly, it is crucial to have a suitable dataset …
Over the years, pervasive computing and communication technologies have enabled the emergence of new computing paradigms that have gained importance across a wide …
F Jahan, W Sun, Q Niyaz, M Alam - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Autonomous systems will soon be integrating into our lives as home assistants, delivery drones, and driverless cars. The implementation of the level of automation in these systems …
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with many organizations investing in the development of proper tools and services and the …
S Soderi, D Masti, YZ Lun - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
Technological advances in the telecommunications industry have brought significant advantages in the management and performance of communication networks. The railway …
H Almohannadi, I Awan, J Al Hamar… - 2018 IEEE 32nd …, 2018 - ieeexplore.ieee.org
Cyber attacks are increasing in every aspect of daily life. There are a number of different technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS) …
Due to increased number of attacks on the Internet of Things (IoT) devices, the security of IoT networks became critical. Some recent researches proposed the adoption of blockchain in …
MI Al-Ghamdi - Materials Today: Proceedings, 2021 - academia.edu
It cannot be underestimated the importance of using real-world data to enable and validate dynamic network research for cyber security purposes. Sadly, the use of real-world data for …