Application of Machine Learning for Ransomware Detection in IoT Devices
暂无分享,去创建一个
Roseline Oluwaseun Ogundokun | Joseph Bamidele Awotunde | Oluwakemi Christiana Abikoye | J. B. Awotunde | Sanjay Misra | Oluwafemi Folarin | R. Ogundokun | O. Abikoye | S. Misra | Oluwafemi Folarin
[1] M. North,et al. Ransomware: Evolution, Mitigation and Prevention , 2017 .
[2] Stanislav Abaimov,et al. Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS) , 2018, Int. J. Inf. Syst. Crisis Response Manag..
[3] Stefano Bianchi,et al. Privacy and Security Threats on the Internet of Things , 2019, Internet of Things Security and Data Protection.
[4] George Basalla,et al. Technology in World Civilization: A Thousand-Year History by Arnold Pacey (review) , 1992, Technology and Culture.
[5] Pijush Kanti Dutta Pramanik,et al. Internet of things, smart sensors, and pervasive systems: Enabling connected and pervasive healthcare , 2019, Healthcare Data Analytics and Management.
[6] Philippe Aghion,et al. Artificial Intelligence and Economic Growth , 2017, The Economics of Artificial Intelligence.
[7] Damon McCoy,et al. Tracking Ransomware End-to-end , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[8] Torsten Schröder,et al. Architecture and the Smart City , 2019 .
[9] Antonio F. Skarmeta,et al. A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[10] Ali Dehghantanha,et al. Fuzzy pattern tree for edge malware detection and categorization in IoT , 2019, J. Syst. Archit..
[11] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[12] Graham Neubig,et al. Differentiable Reasoning over a Virtual Knowledge Base , 2020, ICLR.
[13] Erik Brynjolfsson,et al. The second machine age: work, progress, and prosperity in a time of brilliant technologies, 1st Edition , 2014 .
[14] Bernhard Haslhofer,et al. Ransomware Payments in the Bitcoin Ecosystem , 2018, J. Cybersecur..
[15] Fahim Arif,et al. Real-time data processing scheme using big data analytics in internet of things based smart transportation environment , 2019, J. Ambient Intell. Humaniz. Comput..
[16] Balamurugan Balusamy,et al. Wearable Devices and IoT , 2019, A Handbook of Internet of Things in Biomedical and Cyber Physical System.
[17] Kim-Kwang Raymond Choo,et al. A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.
[18] Jinsoo Hwang,et al. Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques , 2020, Wirel. Pers. Commun..
[19] Hadis Karimipour,et al. Applications of Big Data Analytics and Machine Learning in the Internet of Things , 2020, Handbook of Big Data Privacy.
[20] Jianxiong Xiao,et al. DeepDriving: Learning Affordance for Direct Perception in Autonomous Driving , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[21] Priti Das,et al. Healthcare 5.0: A Paradigm Shift in Digital Healthcare System Using Artificial Intelligence, IOT and 5G Communication , 2019, 2019 International Conference on Applied Machine Learning (ICAML).
[22] Antonio Iera,et al. Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm , 2017, Ad Hoc Networks.
[23] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[24] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[25] Yinhai Wang,et al. A Smart, Efficient, and Reliable Parking Surveillance System With Edge Artificial Intelligence on IoT Devices , 2020 .
[26] N. Kshetri. Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .
[27] Patrick Traynor,et al. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[28] Budi Arief,et al. Ransomware deployment methods and analysis: views from a predictive model and human responses , 2019, Crime Science.
[29] Sharad Agarwal,et al. Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk , 2019, Sensors.
[30] Choong Seon Hong,et al. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..
[31] Ioan C. Bacivarov,et al. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry , 2017 .
[32] Scott E. Fahlman,et al. Knowledge-Driven Learning and Discovery , 2007, AAAI.
[33] Cryptovirology: the birth, neglect, and explosion of ransomware , 2017 .
[34] Francesca Lonetti,et al. A Systematic Review on Cloud Testing , 2019, ACM Comput. Surv..
[35] Murat Kantarcioglu,et al. BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain , 2020, IJCAI.
[36] Alessio Merlo,et al. Towards energy-aware intrusion detection systems on mobile devices , 2013, 2013 International Conference on High Performance Computing & Simulation (HPCS).
[37] Miss. Harshada U Salvi,et al. Ransomware: A Cyber Extortion , 2016 .
[38] Ali Tekeoglu,et al. Artorias: IoT Security Testing Framework , 2019, 2019 26th International Conference on Telecommunications (ICT).
[39] Yurong Liu,et al. A survey of deep neural network architectures and their applications , 2017, Neurocomputing.
[40] M. Babel,et al. Development of a Generic Domestic Water Security Index, and Its Application in Addis Ababa, Ethiopia , 2018, Water.
[41] Ali Dehghantanha,et al. Towards secure model for SCADA systems , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[42] Prabaharan Poornachandran,et al. Deep learning LSTM based ransomware detection , 2017, 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).
[43] Yuval Elovici,et al. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments , 2020, Neural Networks.
[44] T. P. Hughes,et al. The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .
[45] Lida Xu,et al. Big data for cyber physical systems in industry 4.0: a survey , 2019, Enterp. Inf. Syst..
[46] P Thiyagarajan. A Review on Cyber Security Mechanisms Using Machine and Deep Learning Algorithms , 2020 .
[47] Azeem Ayaz Mirani,et al. A Review of Agro-Industry in IoT: Applications and Challenges , 2019 .
[48] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[49] J. Hernandez-Castro,et al. An economic analysis of ransomware and its welfare consequences , 2020, Royal Society Open Science.
[50] Tomislav Dragicevic,et al. Future effectual role of energy delivery: A comprehensive review of Internet of Things and smart grid , 2018, Renewable and Sustainable Energy Reviews.
[51] Brij B. Gupta,et al. Security Threats and Recent Countermeasures in Cloud Computing , 2020 .
[52] Shafii Muhammad Abdulhamid,et al. Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms , 2019, Journal of Reliable Intelligent Environments.
[53] Sakir Sezer,et al. Evolution of ransomware , 2018, IET Networks.
[54] Elisa Bertino,et al. Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..
[55] Fabio Massacci,et al. MalwareLab: Experimentation with Cybercrime Attack Tools , 2013, CSET.
[56] Neeraj Kumar,et al. Machine Learning Models for Secure Data Analytics: A taxonomy and threat model , 2020, Comput. Commun..
[57] S. Diamond. In Search of the Primitive: A Critique of Civilization , 1979 .
[58] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[59] Antonella Santone,et al. Model checking for malicious family detection and phylogenetic analysis in mobile environment , 2020, Comput. Secur..
[60] Alessandro Nuvolari,et al. Collective invention during the British , 2004 .
[61] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[62] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[63] Mohammad Ali Jabraeil Jamali,et al. Some Cases of Smart Use of the IoT , 2019, Towards the Internet of Things.
[64] Thaier Hayajneh,et al. Hardware Security in IoT Devices with Emphasis on Hardware Trojans , 2019, J. Sens. Actuator Networks.
[65] Quan Z. Sheng,et al. Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies , 2020, IEEE Communications Surveys & Tutorials.
[66] Shahaboddin Shamshirband,et al. Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges , 2015, J. Netw. Comput. Appl..
[67] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[68] Shalini Batra,et al. Trust management in social Internet of Things: A taxonomy, open issues, and challenges , 2020, Comput. Commun..
[69] Ram Mohana Reddy Guddeti,et al. Resource Provisioning Framework for IoT Applications in Fog Computing Environment , 2018, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[70] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[71] Hoan Quoc Nguyen-Mau,et al. Recent advances on artificial intelligence and internet of things convergence for human-centric applications: internet of things science , 2018, IOT.
[72] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[73] Scott J. Shackelford. Smart Factories, Dumb Policy? Managing Cybersecurity and Data Privacy Risks in the Industrial Internet of Things , 2018 .
[74] Rajkumar Buyya,et al. Internet of Things (IoT) and New Computing Paradigms , 2018, Fog and Edge Computing.
[75] Adeniyi Abidemi Emmanuel,et al. Application of Smartphone Qrcode Scanner as a means of Authenticating Student Identity Card , 2020 .
[76] A. M. Said,et al. Consequences of the 2004 Indian Ocean Tsunami in Malaysia , 2020 .
[77] Bander Ali Saleh Al-rimy,et al. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions , 2018, Comput. Secur..
[78] C. D. Jaidhar,et al. Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM , 2018 .
[79] Aniello Cimitile,et al. Talos: no more ransomware victims with formal methods , 2018, International Journal of Information Security.
[80] Prem Prakash Jayaraman,et al. Internet of Things and Edge Cloud Computing Roadmap for Manufacturing , 2016, IEEE Cloud Computing.
[81] Julio Hernandez-Castro,et al. Economic Analysis of Ransomware , 2017, ArXiv.
[82] Li Da Xu,et al. Industry 4.0: state of the art and future trends , 2018, Int. J. Prod. Res..
[83] Hao Wang,et al. Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies , 2019, Enterp. Inf. Syst..
[84] Burak Kantarci,et al. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities , 2019, Sustainable Cities and Society.
[85] Victor Hugo C. de Albuquerque,et al. Artificial intelligence techniques empowered edge-cloud architecture for brain CT image analysis , 2020, Eng. Appl. Artif. Intell..
[86] Norbert Wiener,et al. Cybernetics. , 1948, Scientific American.
[87] Robertas Damaševičius,et al. An IOT-Based Architecture for Crime Management in Nigeria , 2019, Data, Engineering and Applications.
[88] Ashish Khanna,et al. The Role of Big Data Predictive Analytics and Radio Frequency Identification in the Pharmaceutical Industry , 2019, IEEE Access.
[89] Garima Chopra,et al. A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..
[90] Tan Yigitcanlar,et al. Can cities become smart without being sustainable? A systematic review of the literature , 2019, Sustainable Cities and Society.
[91] Rajhans Mishra,et al. Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges , 2019, Enterp. Inf. Syst..
[92] Tu Bao Ho,et al. Knowledge Acquisition by Machine Learning and Data Mining , 2007, Creative Environments.
[93] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[94] Vinay Avasthi,et al. Ransomware: A Rising Threat of new age Digital Extortion , 2015, ArXiv.
[95] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[96] Juergen Jasperneite,et al. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 , 2017, IEEE Industrial Electronics Magazine.
[97] Alessandro Nuvolari,et al. Collective Invention during the British Industrial Revolution The Case of the Cornish Pumping Engine , 2004 .
[98] Lamya Benamar,et al. Internet of Things devices appropriation process: The Dynamic Interactions Value Appropriation (DIVA) framework , 2020 .
[99] Tomáš Kvasňovský. Autonomous Weapon Systems as the next revolution in warfare and implications of technology deployment for global security , 2020 .
[100] Roseline Oluwaseun Ogundokun,et al. Semantics-based clustering approach for similar research area detection , 2020, TELKOMNIKA (Telecommunication Computing Electronics and Control).
[101] Alan Fowler,et al. The role of AI-based technology in support of the knowledge management value activity cycle , 2000, J. Strateg. Inf. Syst..
[102] Usha Devi Gandhi,et al. A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases , 2017, Comput. Electr. Eng..
[103] T Velásquez-Pérez,et al. Good practice guide around the security of the internet of things in smart homes , 2019 .
[104] Antonella Santone,et al. Ransomware Inside Out , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[105] Jin Song Dong,et al. Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues , 2019, IEEE Communications Surveys & Tutorials.
[106] Amit P. Sheth,et al. Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.
[107] Keonsoo Lee,et al. A Study on Research Trends of Technologies for Industry 4.0; 3D Printing, Artificial Intelligence, Big Data, Cloud Computing, and Internet of Things , 2018, MUE/FutureTech.
[108] Andrea Castillo O'Sullivan,et al. Projecting the Growth and Economic Impact of the Internet of Things , 2015 .
[109] Ercan Öztemel,et al. Literature review of Industry 4.0 and related technologies , 2018, J. Intell. Manuf..
[110] Thanh Cong Truong,et al. Artificial Intelligence and Cybersecurity: Past, Presence, and Future , 2020, Advances in Intelligent Systems and Computing.
[111] Giancarlo Fortino,et al. On the Classification of Cyberphysical Smart Objects in the Internet of Things , 2014, UBICITEC.
[112] Zubair A. Baig,et al. Ransomware: Emergence of the cyber-extortion menace , 2015 .
[113] Qihui Wu,et al. Cognitive Internet of Things: A New Paradigm Beyond Connection , 2014, IEEE Internet of Things Journal.
[114] Fernando Deschamps,et al. Past, present and future of Industry 4.0 - a systematic literature review and research agenda proposal , 2017, Int. J. Prod. Res..
[115] Patrick D. McDaniel,et al. Program Analysis of Commodity IoT Applications for Security and Privacy , 2018, ACM Comput. Surv..
[116] Kenrick Mock,et al. Artificial Intelligence-Based Cybercrime , 2020 .
[117] Sylvain Hallé,et al. 10 Years of IoT Malware: A Feature-Based Taxonomy , 2019, 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[119] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.
[120] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.
[121] Farnaz Farid,et al. Applying Internet of Things and Machine-Learning for Personalized Healthcare: Issues and Challenges , 2018, 2018 International Conference on Machine Learning and Data Engineering (iCMLDE).
[122] Jason R. C. Nurse,et al. The Social and Psychological Impact of Cyber-Attacks , 2019, Emerging Cyber Threats and Cognitive Vulnerabilities.
[123] Roseline Oluwaseun Ogundokun,et al. Evaluation of load balancing algorithms on overlappiing wireless accesspoints , 2021 .
[124] Madhusanka Liyanage,et al. Introduction to IoT , 2019, IoT Security.
[125] Alessio Merlo,et al. Measuring and estimating power consumption in Android to support energy-based intrusion detection , 2015, J. Comput. Secur..
[126] Ejaz Ahmed,et al. Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..
[127] Theodore Tryfonas,et al. The Internet of Things: a security point of view , 2016, Internet Res..
[128] K. Desouza,et al. Contributions and Risks of Artificial Intelligence (AI) in Building Smarter Cities: Insights from a Systematic Review of the Literature , 2020, Energies.
[129] Farshad Firouzi,et al. The Smart “Things” in IoT , 2020 .
[130] Hani Alshahrani,et al. An Intelligent Behavior-Based Ransomware Detection System For Android Platform , 2019, 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
[131] T. Sung. Industry 4.0: A Korea perspective , 2017, Technological Forecasting and Social Change.
[132] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[133] Ali Dehghantanha,et al. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.
[134] Urvashi Garg,et al. Advanced Petya Ransomware and Mitigation Strategies , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).
[135] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[136] Foutse Khomh,et al. Enforcing security in Internet of Things frameworks: A Systematic Literature Review , 2019, Internet Things.
[137] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[138] Murat Kantarcioglu,et al. BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain , 2019, ArXiv.
[139] Jingyue Li,et al. The AI-Based Cyber Threat Landscape , 2020, ACM Comput. Surv..
[140] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[141] Victor I. Chang,et al. Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..
[142] Shane D. Johnson,et al. A systematic review of crime facilitated by the consumer Internet of Things , 2019, Security Journal.
[143] Charalampos D. Kokkinos,et al. The Signification of Objects in the Context of a Critical Examination of Technological Civilization: An Interdisciplinary Approach , 2013 .
[144] Sanmeet Kaur,et al. Evolution of Internet of Things (IoT) and its significant impact in the field of Precision Agriculture , 2019, Comput. Electron. Agric..
[145] Spyros Makridakis,et al. The Forthcoming Artificial Intelligence (AI) Revolution: Its Impact on Society and Firms , 2017 .
[147] Daron Acemoglu,et al. Artificial Intelligence, Automation and Work , 2018 .
[148] Ruchi Vishwakarma,et al. A survey of DDoS attacking techniques and defence mechanisms in the IoT network , 2019, Telecommunication Systems.
[149] Eleonora Borgia,et al. The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..
[150] Antonio Iera,et al. A systemic and cognitive approach for IoT security , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[151] Paul F. Cleary,et al. Security Challenges in the 21st Century: The Changing Nature of Risk, Security and Sustainability , 2017, AHFE.
[152] James R. Beniger. The Control Revolution: Technological and Economic Origins of the Information Society , 1986 .
[153] Ali Dehghantanha,et al. Detecting crypto-ransomware in IoT networks based on energy consumption footprint , 2018, J. Ambient Intell. Humaniz. Comput..
[154] M. Yar,et al. Book Review: Cybercrime and Society , 2006 .
[155] Ali Dehghantanha,et al. Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware , 2018, ArXiv.
[156] Mohammad Hossein Jarrahi,et al. Artificial intelligence and the future of work: Human-AI symbiosis in organizational decision making , 2018, Business Horizons.
[157] Hellesen Niclas,et al. Cyber Situational Security Awareness Architecture (CSSA) for Industrial Control Systems , 2019 .
[158] Martti Lehto,et al. Artificial intelligence in the cyber security environment , 2019 .
[159] Chandrakumar Thangavel,et al. Security Challenges in the IoT Paradigm for Enterprise Information Systems , 2017 .
[160] M. Harbers,et al. The Internet of Things in a Smart Society: How Government Policy Can Help Seize Opportunities and Mitigate Threats , 2020 .
[161] Ransomware: The Cyber Extortionist , 2018 .
[162] Nikša Fafandjel,et al. Toward shipbuilding 4.0 - an industry 4.0 changing the face of the shipbuilding industry , 2018 .
[163] Laxmi B. Bhagwat,et al. Detection of Ransomware Attack: A Review , 2020 .
[164] Satinderjeet Singh,et al. Embedding Machine & Deep Learning for Mitigating Security & Privacy Issues in IoT Enabled Devices & Networks , 2018 .
[165] Sule Yildirim Yayilgan,et al. Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[166] Anthony C. Boucouvalas,et al. Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture , 2011, Adv. Internet Things.
[167] Seungmin Rho,et al. A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services , 2017, Cluster Computing.
[168] Nir Nissim,et al. Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory , 2018, Expert Syst. Appl..
[169] Thaier Hayajneh,et al. Detection and prevention of crypto-ransomware , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).
[170] Jerome Henry,et al. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things , 2017 .
[171] Ali Dehghantanha,et al. The Future of Blockchain Technology in Healthcare Internet of Things Security , 2020, Blockchain Cybersecurity, Trust and Privacy.
[172] J. Haskel,et al. The Internet of Things and economic growth in a panel of countries , 2019, Economics of Innovation and New Technology.
[173] Athanasios V. Vasilakos,et al. The role of big data analytics in Internet of Things , 2017, Comput. Networks.
[174] Ali Selamat,et al. A survey on malware propagation, analysis, and detection , 2013 .
[175] Colin Tankard,et al. The security issues of the Internet of Things , 2015 .
[176] Neeraj Kumar,et al. An Efficient Spam Detection Technique for IoT Devices Using Machine Learning , 2021, IEEE Transactions on Industrial Informatics.
[177] Olatunji Okesola,et al. A 3-D MODEL OF AN INSTITUTIONAL LOCATION NAVIGATION SYSTEM (NAVILOC) (A CASE STUDY OF COVENANT UNIVERSITY) , 2019 .
[178] John M. Acken,et al. Additional Security Considerations for Cloud , 2020 .
[179] Friedemann Mattern,et al. From the Internet of Computers to the Internet of Things , 2010, From Active Data Management to Event-Based Systems and More.
[180] Ali Dehghantanha,et al. Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection , 2018, ArXiv.