1 năm trước
In recent years, the advancements in the Internet of Medical Things (IoMT) or smart devices have enabled the automatic monitoring of human health. Using smart healthcare devices can not only reduce the burden on hospitals but also save costs, travel time, and provide a way to diagnose diseases at home,…
Đọc tiếp >>>1 năm trước
An increasing number of devices are connecting to the Internet via Wi-Fi networks, ranging from mobile phones to Internet of Things (IoT) devices. Moreover, Wi-Fi technology has undergone gradual development, with various standards and implementations. In a Wi-Fi network, a Wi-Fi client typically uses the Transmission Control Protocol (TCP) for…
Đọc tiếp >>>2 năm trước
Nowadays, in the realm of blockchain technology, a pressing challenge lies in the current lack of interoperability, which significantly limits its potential for innovation and advancement. However, the attainment of cross-chain interoperability is undeniable of utmost importance, as it holds the key to maximizing the network’s computing performance, expanding storage…
Đọc tiếp >>>2 năm trước
The recent explosion in the number and advancement of cyberattacks induces the deployment of machine learning (ML)-based network intrusion detection systems (NIDS) in the network infrastructure of each corporation. However, there are plenty of difficulties for enterprise organization in training a conventional ML-based IDS, such as the data shortage, the…
Đọc tiếp >>>2 năm trước
Advanced persistent threats (APT) are increasingly sophisticated and pose a significant threat to organizations’ cybersecurity. Detecting APT attacks in a timely manner is crucial to prevent significant damage. However, hunting for APT attacks requires access to large amounts of sensitive data, which is typically spread across different organizations. This makes…
Đọc tiếp >>>2 năm trước
Recently, the application of machine learning (ML) in the field of cybersecurity, particularly in the detection and prevention of malware, has received significant attention and interest. Numerous research works on malware analysis have been proposed, showing promising results for practical applications. In such works, the use of Generative Adversarial Networks…
Đọc tiếp >>>2 năm trước
With the growth and expansion of the internet, web attacks have become more powerful and pose a significant threat in the cyber world. In response to this, this paper presents a deceptive approach for gathering malicious behavior to understand the strategies used by web attackers. The harmful requests collected through…
Đọc tiếp >>>2 năm trước
The increasing proliferation of phishing and scamming websites has become a significant threat to the safety and security of internet users. Accurately detecting such websites is crucial in mitigating their negative impact. While various techniques for detecting phishing and scamming websites exist, machine learning-based approaches have gained significant attention in…
Đọc tiếp >>>