期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment 被引量:1
1
作者 Fadwa Alrowais Sami Althahabi +3 位作者 Saud S.Alotaibi Abdullah Mohamed Manar Ahmed Hamza Radwa Marzouk 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期687-700,共14页
Recently,Internet of Things(IoT)devices produces massive quantity of data from distinct sources that get transmitted over public networks.Cybersecurity becomes a challenging issue in the IoT environment where the exis... Recently,Internet of Things(IoT)devices produces massive quantity of data from distinct sources that get transmitted over public networks.Cybersecurity becomes a challenging issue in the IoT environment where the existence of cyber threats needs to be resolved.The development of automated tools for cyber threat detection and classification using machine learning(ML)and artificial intelligence(AI)tools become essential to accomplish security in the IoT environment.It is needed to minimize security issues related to IoT gadgets effectively.Therefore,this article introduces a new Mayfly optimization(MFO)with regularized extreme learning machine(RELM)model,named MFO-RELM for Cybersecurity Threat Detection and classification in IoT environment.The presented MFORELM technique accomplishes the effectual identification of cybersecurity threats that exist in the IoT environment.For accomplishing this,the MFO-RELM model pre-processes the actual IoT data into a meaningful format.In addition,the RELM model receives the pre-processed data and carries out the classification process.In order to boost the performance of the RELM model,the MFO algorithm has been employed to it.The performance validation of the MFO-RELM model is tested using standard datasets and the results highlighted the better outcomes of the MFO-RELM model under distinct aspects. 展开更多
关键词 cybersecurity threats classification internet of things machine learning parameter optimization
下载PDF
Developing an Abstraction Framework for Managing and Controlling Saudi Banks’ Cybersecurity Threats Based on the NIST Cybersecurity Framework and ISO/IEC 27001
2
作者 Abdulaziz Saleh Alraddadi 《Journal of Software Engineering and Applications》 2023年第12期695-713,共19页
Saudi Arabian banks are deeply concerned about how to effectively monitor and control security threats. In recent years, the country has taken several steps towards restructuring its organizational security and, conse... Saudi Arabian banks are deeply concerned about how to effectively monitor and control security threats. In recent years, the country has taken several steps towards restructuring its organizational security and, consequently, protecting financial institutions and their clients. However, there are still several challenges left to be addressed. Accordingly, this article aims to address this problem by proposing an abstract framework based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework and International Organization for Standardization/International Electrotechnical Commission (ISO/IEC 27001). The framework proposed in this paper considers the following factors involved in the security policy of Saudi banks: safety, Saudi information bank, operations and security of Saudi banks, Saudi banks’ supplier relationships, risk assessment, risk mitigation, monitoring and detection, incident response, Saudi banks’ business continuity, compliance, education, and awareness about all factors contributing to the framework implementation. This way, the proposed framework provides a comprehensive, unified approach to managing bank security threats. Not only does the proposed framework provide effective guidance on how to identify, assess, and mitigate security threats, but it also instructs how to develop policy and procedure documents relating to security issues. 展开更多
关键词 cybersecurity threats NIST cybersecurity Framework ISO/IEC 27001 Saudi Banks Design Science Research
下载PDF
Design of Cybersecurity Threat Warning Model Based on Ant Colony Algorithm
3
作者 Weiwei Lin Reiko Haga 《Journal on Big Data》 2021年第4期147-153,共7页
In this paper,a cybersecurity threat warning model based on ant colony algorithm is designed to strengthen the accuracy of the cybersecurity threat warning model in the warning process and optimize its algorithm struc... In this paper,a cybersecurity threat warning model based on ant colony algorithm is designed to strengthen the accuracy of the cybersecurity threat warning model in the warning process and optimize its algorithm structure.Through the ant colony algorithm structure,the local global optimal solution is obtained;and the cybersecurity threat warning index system is established.Next,the above two steps are integrated to build the cybersecurity threat warning model based on ant colony algorithm,and comparative experiment is also designed.The experimental results show that,compared with the traditional qualitative differential game-based cybersecurity threat warning model,the cybersecurity threat warning model based on ant colony algorithm has a higher correct rate in the warning process,and the algorithm program is simpler with higher use value. 展开更多
关键词 Ant colony algorithm cybersecurity threats warning model index system
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
4
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor Networks(WSNs) elliptic curve cryptography
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部