Skip to main content

and
  1. No Access

    Chapter

    Map** CKC Model Through NLP Modelling for APT Groups Reports

    We are seeing a constant increase in the number of cyberattacks with both monetary and political motives behind them. As such it becomes crucial to identify Advanced Persistent Threats (APT) groups for future ...

    Aaruni Upadhyay, Samira Eisaloo Gharghasheh in Handbook of Big Data Analytics and Forensi… (2022)

  2. No Access

    Chapter

    A Comparison Between Different Machine Learning Models for IoT Malware Detection

    The rapid expansion of IoT devices and their use in business and critical infrastructure has made them vulnerable to threats from hackers and malwares. These malwares pose a serious threat to the availability ...

    Sanaz Nakhodchi, Aaruni Upadhyay, Ali Dehghantanha in Security of Cyber-Physical Systems (2020)

  3. No Access

    Chapter

    Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis

    By using IoT in agriculture which is used for remote monitoring and automation bring a new concern about security and privacy, due to facing huge scale of data in its environment. Most studies aim to present n...

    Sanaz Nakhodchi, Ali Dehghantanha, Hadis Karimipour in Handbook of Big Data Privacy (2020)

  4. No Access

    Chapter

    A Bibliometric Analysis on the Application of Deep Learning in Cybersecurity

    The power of artificial intelligence especially deep learning algorithms led to use them in variety fields such as speech recognition, image processing, bioinformatics, robotics and even cybersecurity. Most of...

    Sanaz Nakhodchi, Ali Dehghantanha in Security of Cyber-Physical Systems (2020)