Search
Search Results
-
Defining Security Metrics
How do you know how well you are doing, unless you have metrics to tell you? Metrics provide decision support in running an organization. When an... -
Security Metrics and Authentication-based RouTing (SMART) Protocol for Vehicular IoT Networks
Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of...
-
A security vulnerability predictor based on source code metrics
Detecting security vulnerabilities in the source code of software systems is one of the most important challenges in the field of software security....
-
A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning
In Machine Learning, the datasets used to build models are one of the main factors limiting what these models can achieve and how good their...
-
Empowering Network Security through Advanced Analysis of Malware Samples: Leveraging System Metrics and Network Log Data for Informed Decision-Making
In the never-ending battle against rising malware threats, cybersecurity professionals were constantly challenged by malware researchers. Businesses...
-
Attack Graph Based Security Metrics for Dynamic Networks
Evaluating network attack graphs in today’s dynamic networks poses a challenge. Conventional metrics used for attack graph based risk assessment are... -
Security Metrics
It has always been a struggle for information security professionals to measure “the effectiveness” of IT security controls. In the 1980s, “orange... -
-
Predicting software vulnerability based on software metrics: a deep learning approach
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems....
-
Estimating vulnerability metrics with word embedding and multiclass classification methods
Cyber security has an increasing importance since the day when information technologies are an invariable part of modern human life. One of the...
-
A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics
The goal of this research is to build a vulnerability prediction model to assist developers in evaluating the security of software systems during the...
-
Security to text (S2T): multi-layered based security approaches for secret text content
In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...
-
Cloud data security for distributed embedded systems using machine learning and cryptography
In the growing demand for distributed embedded systems that efficiently execute complex processes and high-end applications, safeguarding sensitive...
-
Social bot metrics
In this paper, we propose metrics for malicious bots that provide a qualitative estimation of a bot type involved in the attack in social media: price ...
-
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain
The recent expansion of the IoT ecosystem has not only significantly increased connectivity but also introduced new security challenges. To address...
-
A review on graph-based approaches for network security monitoring and botnet detection
This survey paper provides a comprehensive overview of recent research and development in network security that uses graphs and graph-based data...
-
Privacy and security federated reference architecture for Internet of Things
Physical objects are getting connected to the Internet at an exceptional rate, making the idea of the Internet of Things (IoT) a reality. The IoT...
-
Decoding the future: exploring and comparing ABE standards for cloud, IoT, blockchain security applications
Data security poses a significant challenge in cloud computing, the Internet of Things (IoT), and blockchain applications. Attribute-Based Encryption...
-
Machine learning and deep learning models for human activity recognition in security and surveillance: a review
Human activity recognition (HAR) has received the significant attention in the field of security and surveillance due to its high potential for...
-
A blockchain-based security system with light cryptography for user authentication security
Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology,...