Thakral et al., 2022 - Google Patents
Cybersecurity and ethics for IoT system: A massive analysisThakral et al., 2022
- Document ID
- 4749445653198032420
- Author
- Thakral M
- Singh R
- Kalghatgi B
- Publication year
- Publication venue
- Internet of Things: Security and Privacy in Cyberspace
External Links
Snippet
This year's exponential growth of digital links has resulted in a rise in cyber strikes, many of which have tragic and severe repercussions. Malware is the most common phenomenon used to achieve malevolent aims on the Internet, whether it is by exploiting new …
- 238000004458 analytical method 0 title description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Srivastava et al. | XAI for cybersecurity: state of the art, challenges, open issues and future directions | |
| Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
| Alghofaili et al. | Secure cloud infrastructure: A survey on issues, current solutions, and open challenges | |
| Lin et al. | At the nexus of cybersecurity and public policy: Some basic concepts and issues | |
| Mohammed et al. | A new lightweight data security system for data security in the cloud computing | |
| Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
| de Oliveira Albuquerque et al. | Leveraging information security and computational trust for cybersecurity | |
| Thakral et al. | Cybersecurity and ethics for IoT system: A massive analysis | |
| Lazarovitz | Deconstructing the solarwinds breach | |
| Kumar et al. | Anatomy of ransomware: attack stages, patterns and handling techniques | |
| Möller | Threats and threat intelligence | |
| Kaur et al. | Cybersecurity threats in FinTech | |
| Priyadarshini | Introduction on cybersecurity | |
| Pogrebna et al. | Navigating new cyber risks | |
| Sujatha et al. | Cyber Security Applications for Industry 4.0 | |
| Aiden et al. | AI and blockchain for cyber security in cyber-physical system | |
| Kumar et al. | AI powered correlation technique to detect virtual machine attacks in private cloud environment | |
| Jimo et al. | IoE security risk analysis in a modern hospital ecosystem | |
| Kaur et al. | Introduction to cybersecurity | |
| Oreku et al. | Cybercrime: Concerns, challenges and opportunities | |
| Ezeji | Cyber policy for monitoring and regulating cyberspace and cyber security measures for combating technologically enhanced crime in South Africa | |
| Silva | Web 3.0 and Cybersecurity–Short Paper | |
| Tounsi | Cyber-Vigilance and digital trust: cyber security in the era of cloud computing and IoT | |
| Almasri | Towards generating a practical SUNBURST attack dataset for network attack detection | |
| Kaur | Cyber security challenges in the latest technology |