
-
IoT Malware Network Traffic Classification using Visual Representation and Deep Learning
With the increase of IoT devices and technologies coming into service, M...
read it
-
A machine-learning approach to Detect users' suspicious behaviour through the Facebook wall
Facebook represents the current de-facto choice for social media, changi...
read it
-
A Novel Malware Detection System Based On Machine Learning and Binary Visualization
The continued evolution and diversity of malware constitutes a major thr...
read it
-
Data Protection by Design for Cybersecurity Systems in a Smart Home Environment
The present paper deals with the elucidation and implementation of the D...
read it
-
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
The technological evolution brought by the Internet of things (IoT) come...
read it
-
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis
Malicious software is detected and classified by either static analysis ...
read it
-
Detection of LDDoS Attacks Based on TCP Connection Parameters
Low-rate application layer distributed denial of service (LDDoS) attacks...
read it
-
Blockchain Technologies for Enhanced Security and Privacy in the Internet of Things
Blockchain is a disruptive technology that has been characterised to be ...
read it
-
Are cracked applications really free? An empirical analysis on Android devices
Android is among the popular platforms running on millions of smart devi...
read it
-
A Novel Blockchain-based Trust Model for Cloud Identity Management
Secure and reliable management of identities has become one of the great...
read it