Computational intelligence enabled cybersecurity for the internet of things

S Zhao, S Li, L Qi, L Da Xu - IEEE Transactions on Emerging …, 2020 - ieeexplore.ieee.org
The computational intelligence (CI) based technologies play key roles in campaigning
cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber …

Recognizing human behaviours in online social networks

F Amato, A Castiglione, A De Santo, V Moscato… - Computers & …, 2018 - Elsevier
Abstract Online Social Networks (OSNs) have become a primary area of interest for cutting-
edge cybersecurity applications, due to their ever increasing popularity and to the variety of …

AES power attack based on induced cache miss and countermeasure

G Bertoni, V Zaccaria, L Breveglieri… - … Computing (ITCC'05 …, 2005 - ieeexplore.ieee.org
This paper presents a new attack against a software implementation of the Advanced
Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus …

A framework for designing vulnerability metrics

M Albanese, I Iganibo, O Adebiyi - Computers & Security, 2023 - Elsevier
Vulnerability analysis has long been used to evaluate the security posture of a system.
Different approaches, including vulnerability graphs and various vulnerability metrics, have …

Iseql, an interval-based surveillance event query language

S Helmer, F Persia - … Journal of Multimedia Data Engineering and …, 2016 - igi-global.com
The authors propose ISEQL, a language based on relational algebra extended by intervals
for detecting high-level surveillance events from a video stream. The operators they …

Modeling and efficiently detecting security-critical sequences of actions

A Guzzo, M Ianni, A Pugliese, D Saccà - Future Generation Computer …, 2020 - Elsevier
Many different techniques and tools have been proposed to prevent and detect malicious
activities by means of a very challenging data analysis task. The main sources for data …

An overview of video surveillance approaches

F Persia, D D'Auria, G Pilato - 2020 IEEE 14th International …, 2020 - ieeexplore.ieee.org
In this paper, we present an overview of video surveillance approaches that are more
related to the Internet-of-things (IoT) paradigm. We describe the first model-based …

An attack volume metric

I Iganibo, M Albanese, M Mosko, E Bier… - Security and …, 2023 - Wiley Online Library
For more than a decade, the notion of attack surface has been used to define the set of
vulnerable assets that an adversary may exploit to penetrate a system, and various metrics …

Intrusion detection with hypergraph-based attack models

A Guzzo, A Pugliese, A Rullo, D Sacca - Graph Structures for Knowledge …, 2014 - Springer
In numerous security scenarios, given a sequence of logged activities, it is necessary to look
for all subsequences that represent an intrusion, which can be meant as any “improper” use …

High-level surveillance event detection using an interval-based query language

S Helmer, F Persia - 2016 IEEE Tenth International Conference …, 2016 - ieeexplore.ieee.org
We propose a language based on relational algebra extended by intervals for detecting high-
level surveillance events from a video stream. The operators we introduce for describing …