Internet of Things attack detection using hybrid Deep Learning Model

AK Sahu, S Sharma, M Tanveer, R Raja - Computer Communications, 2021 - Elsevier
Abstract The Internet of Things (IoT) has become a very popular area of research due to its
large-scale implementation and challenges. However, security is the key concern while …

[HTML][HTML] A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks

S Ul Haq, Y Singh, A Sharma, R Gupta… - Discover Internet of Things, 2023 - Springer
IoT and Embedded devices grow at an exponential rate, however, without adequate security
mechanisms in place. One of the key challenges in the cyber world is the security of these …

A rule-based approach for detecting heartbleed cyber attacks

A Amodei, D Capriglione, L Ferrigno… - … on Measurements & …, 2022 - ieeexplore.ieee.org
Today, cyber security is a very critical issue to be addressed at several levels for minimizing
the effects and consequences of cyber attacks. In the last decade many coun-termeasures …

[PDF][PDF] Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks.

MS Hossain, A Paul, MH Islam… - Netw. Protoc …, 2018 - researchgate.net
Web communications between the server and the client are being used extensively.
However, session hijacking has become a critical problem for most of the client-server …

VulnArmor: mitigating software vulnerabilities with code resolution and detection techniques

PV Sindhwad, P Ranka, S Muni, F Kazi - International Journal of …, 2024 - Springer
In today's swiftly evolving digital environment, the security and dependability of software
applications are crucial. In light of industries' increasing reliance on software, identifying and …

Petri net modeling and vulnerability analysis of the Heartbleed

Y Wang, H Wang, X Hei, W Ji… - … on Networking and …, 2021 - ieeexplore.ieee.org
In recent years, a variety of network attacks emerge in an endless stream, and network
attacks gradually show the characteristics of higher secrecy and greater harm. At present …

[PDF][PDF] HEARTBLEED: A CASE STUDY.

JK Harris - Issues in Information Systems, 2018 - iacis.org
On April 7th, 2014 a flaw in OpenSSL was simultaneously announced independently by
researchers at Google and Codenomicon, a Finnish software testing company. The flaw was …

Security Testing of Embedded TLS Implementations

A Lomeli Ramos - 2022 - aaltodoc.aalto.fi
The Transport Layer Security (TLS) protocol is by far the most popular cryptographic protocol
used to secure data being exchanged on the Internet. The latest version, TLS 1.3, provides a …

Benchmark de Sistemas de detecção de intrusões baseados em comportamento com recurso a algoritmos bioinspirados

PJG Ferreira - 2020 - iconline.ipleiria.pt
Com a massificação e diversificação dos ataques por via informática, torna-se
imprescindível a implementação de medidas de prevenção e detecção dos mesmos, tendo …

[PDF][PDF] XGB CLASSIFICATION TECHNIQUE TO RESOLVE IMBALANCED HEART DISEASE DATA

K VenkataNagendra, M Ussenaiah - vsu.ac.in
In the most recent decade there has been expanding use of data mining procedures on
medicinal data for finding helpful patterns that are utilized in Diagnosis and Decision …