NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4
zadetkov: 34
1.
  • Identification of malicious... Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna; Moustafa, Nour; Sitnikova, Elena Journal of information security and applications, 08/2018, Letnik: 41
    Journal Article
    Recenzirano

    Internet Industrial Control Systems (IICSs) that connect technological appliances and services with physical systems have become a new direction of research as they face different types of ...
Celotno besedilo
2.
  • Asynchronous Peer-to-Peer F... Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT
    Al-Hawawreh, Muna; Sitnikova, Elena; Aboutorab, Neda IEEE access, 2021, Letnik: 9
    Journal Article
    Recenzirano
    Odprti dostop

    Industrial Internet of Thing (IIoT) systems are considered attractive ransomware targets because they operate critical services that affect human lives and have substantial operational costs. The ...
Celotno besedilo

PDF
3.
  • Targeted Ransomware: A New ... Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things
    Al-Hawawreh, Muna; Hartog, Frank den; Sitnikova, Elena IEEE internet of things journal, 08/2019, Letnik: 6, Številka: 4
    Journal Article

    Much value in a brownfield Industrial Internet of Things (IIoT) implementation resides at its edge tier, where new types of devices and technologies are deployed to interoperate the legacy industrial ...
Celotno besedilo
4.
  • X-IIoTID: A Connectivity-Ag... X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things
    Al-Hawawreh, Muna; Sitnikova, Elena; Aboutorab, Neda IEEE internet of things journal, 03/2022, Letnik: 9, Številka: 5
    Journal Article

    Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a ...
Celotno besedilo
5.
  • An explainable ensemble of ... An explainable ensemble of multi-view deep learning model for fake review detection
    Mohawesh, Rami; Xu, Shuxiang; Springer, Matthew ... Journal of King Saud University. Computer and information sciences, September 2023, 2023-09-00, 2023-09-01, Letnik: 35, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Online reviews significantly impact consumers who are purchasing or seeking services via the Internet. Businesses and review platforms need to manage these online reviews to avoid misleading ...
Celotno besedilo
6.
Celotno besedilo
7.
  • A privacy-aware framework f... A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning
    Al-Hawawreh, Muna; Hossain, M. Shamim Information fusion, November 2023, 2023-11-00, Letnik: 99
    Journal Article
    Recenzirano

    Internet of Medical Things (IoMT) devices and systems are often designed without adequate security, leaving them highly susceptible to cyber threats. Unlike other IoT applications and devices, cyber ...
Celotno besedilo
8.
  • Developing a Security Testb... Developing a Security Testbed for Industrial Internet of Things
    Al-Hawawreh, Muna; Sitnikova, Elena IEEE internet of things journal, 04/2021, Letnik: 8, Številka: 7
    Journal Article

    While achieving security for Industrial Internet of Things (IIoT) is a critical and nontrivial task, more attention is required for brownfield IIoT systems. This is a consequence of long life cycles ...
Celotno besedilo

PDF
9.
  • Chatgpt for cybersecurity: ... Chatgpt for cybersecurity: practical applications, challenges, and future directions
    Al-Hawawreh, Muna; Aljuhani, Ahamed; Jararweh, Yaser Cluster computing, 12/2023, Letnik: 26, Številka: 6
    Journal Article
    Recenzirano

    Artificial intelligence (AI) advancements have revolutionized many critical domains by providing cost-effective, automated, and intelligent solutions. Recently, ChatGPT has achieved a momentous ...
Celotno besedilo
10.
  • A threat intelligence frame... A threat intelligence framework for protecting smart satellite-based healthcare networks
    Al-Hawawreh, Muna; Moustafa, Nour; Slay, Jill Neural computing & applications, 01/2024, Letnik: 36, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Human-to-machine (H2M) communication is an important evolution in the industrial internet of health things (IIoHT), where many H2M interfaces are remotely interacting with industrial and medical ...
Celotno besedilo

PDF
1 2 3 4
zadetkov: 34

Nalaganje filtrov