![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Evaluating the adoption of cybersecurity and its influence on organizational performance
Cyberattacks negatively impact the performance of enterprises all around the globe. While organizations invest more in cybersecurity to avoid cyberattacks, studies on the factors affecting their overall cybers...
-
Chapter
Big Data Analytics and Forensics: An Overview
Advances in consumer technologies such as Internet of Things (IoT) devices, communication technologies (e.g., 5G), and digitalization of our society reinforce the importance of designing cutting-edge big data ...
-
Chapter
IoT Privacy, Security and Forensics Challenges: An Unmanned Aerial Vehicle (UAV) Case Study
Continuing advances in technologies such as sensors, automatic identification and tracking, embedded computing, wireless communications, broadband Internet access and distributed services have contributed to t...
-
Book
-
Chapter
A Recurrent Attention Model for Cyber Attack Classification
The widespread integration of contemporary computer systems in vast regions of technological landscape has called for an emphasis on data security. Detecting polymorphic malware is an extremely difficult task,...
-
Chapter
Deep Representation Learning for Cyber-Attack Detection in Industrial IoT
Industrial Control System (ICSs), one type of Operational Technology (OT), plays an essential role in monitoring and controlling critical infrastructures such as power plants, smart grids, oil and gas industri...
-
Article
AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things
With the increasing use of the Internet of things (IoT) in diverse domains, security concerns and IoT threats are constantly rising. The computational and memory limitations of IoT devices have resulted in eme...
-
Article
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim’s CPU or GPU resources with the aim of generating cryptocurrency. In this paper...
-
Article
Open AccessThreats on the horizon: understanding security threats in the era of cyber-physical systems
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made possible by higher integration of physical and digital elements. In today’s pervasive cyber-physical systems, co...
-
Article
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes, and API calls, to distinguish malwa...
-
Book
-
Chapter
Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach
According to recent reports from security repositories, malware caused global resources to sustain losses equal to 11.7 million dollars during the last year. The expansion in the tendencies of the profiteers t...
-
Chapter
A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence
Blockchain and artificial intelligence (AI) have gain the most research attention during recent years. Blockchain is a distributed ledger of trustworthy digital records shared by a network of participants. Blo...
-
Chapter
Active Spectral Botnet Detection Based on Eigenvalue Weighting
Botnets are a distributed network of infected nodes captured by cyber-criminals to design and implement a wide-range of cyber attacks. Graph clustering is a significant trend in machine learning that aims to g...
-
Chapter
Immutable and Secure IP Address Protection Using Blockchain
IP addresses can be passed on to new recipients even with a damaged reputation score. It takes a lot of effort to defend a network against storing IP address data using current required practices. A blockchain...
-
Chapter
A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection
The Internet of Things is dramatically changing the face of our modern world. A number of significant organizations are leveraging this onset of IoT to enhance the quality and scope of their digital services. ...
-
Chapter
Anomaly Detection in Cyber-Physical Systems Using Machine Learning
Cyber-Physical Systems (CPS) are characterized by a wide range of complex multi-tasking components with close interaction that leads to integrating cyber sections into the physical world. Considering the signi...
-
Chapter
Blockchain in Cybersecurity Realm: An Overview
Cybersecurity is a pressing need for governments, businesses, and individuals, which is compounded by the fast-pace technological changes and changing cyberthreat landscape. A large number of solutions have be...
-
Chapter
A Comparison Between Different Machine Learning Models for IoT Malware Detection
The rapid expansion of IoT devices and their use in business and critical infrastructure has made them vulnerable to threats from hackers and malwares. These malwares pose a serious threat to the availability ...
-
Chapter
Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis
By using IoT in agriculture which is used for remote monitoring and automation bring a new concern about security and privacy, due to facing huge scale of data in its environment. Most studies aim to present n...