[go: up one dir, main page]

Thakral et al., 2022 - Google Patents

Cybersecurity and ethics for IoT system: A massive analysis

Thakral et al., 2022

Document ID
4749445653198032420
Author
Thakral M
Singh R
Kalghatgi B
Publication year
Publication venue
Internet of Things: Security and Privacy in Cyberspace

External Links

Snippet

This year's exponential growth of digital links has resulted in a rise in cyber strikes, many of which have tragic and severe repercussions. Malware is the most common phenomenon used to achieve malevolent aims on the Internet, whether it is by exploiting new …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Srivastava et al. XAI for cybersecurity: state of the art, challenges, open issues and future directions
Jain et al. A survey of phishing attack techniques, defence mechanisms and open research challenges
Alghofaili et al. Secure cloud infrastructure: A survey on issues, current solutions, and open challenges
Lin et al. At the nexus of cybersecurity and public policy: Some basic concepts and issues
Mohammed et al. A new lightweight data security system for data security in the cloud computing
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
de Oliveira Albuquerque et al. Leveraging information security and computational trust for cybersecurity
Thakral et al. Cybersecurity and ethics for IoT system: A massive analysis
Lazarovitz Deconstructing the solarwinds breach
Kumar et al. Anatomy of ransomware: attack stages, patterns and handling techniques
Möller Threats and threat intelligence
Kaur et al. Cybersecurity threats in FinTech
Priyadarshini Introduction on cybersecurity
Pogrebna et al. Navigating new cyber risks
Sujatha et al. Cyber Security Applications for Industry 4.0
Aiden et al. AI and blockchain for cyber security in cyber-physical system
Kumar et al. AI powered correlation technique to detect virtual machine attacks in private cloud environment
Jimo et al. IoE security risk analysis in a modern hospital ecosystem
Kaur et al. Introduction to cybersecurity
Oreku et al. Cybercrime: Concerns, challenges and opportunities
Ezeji Cyber policy for monitoring and regulating cyberspace and cyber security measures for combating technologically enhanced crime in South Africa
Silva Web 3.0 and Cybersecurity–Short Paper
Tounsi Cyber-Vigilance and digital trust: cyber security in the era of cloud computing and IoT
Almasri Towards generating a practical SUNBURST attack dataset for network attack detection
Kaur Cyber security challenges in the latest technology