Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-7005-2
Abstract: The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior…
read more here.
Keywords:
threat intelligence;
malicious behavior;
method;
threat ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3119008
Abstract: Cyber threats are one of the most pressing issues in the digital age. There has been a consensus on deploying a proactive defense to effectively detect and respond to adversary threats. The key to success…
read more here.
Keywords:
malicious behavior;
open source;
source;
behavior discovery ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "PLoS ONE"
DOI: 10.1371/journal.pone.0263644
Abstract: In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still relies…
read more here.
Keywords:
tagseq malicious;
discovery using;
analysis;
behavior discovery ... See more keywords