Application of Machine Learning for Ransomware Detection in IoT Devices

[1]  M. North,et al.  Ransomware: Evolution, Mitigation and Prevention , 2017 .

[2]  Stanislav Abaimov,et al.  Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS) , 2018, Int. J. Inf. Syst. Crisis Response Manag..

[3]  Stefano Bianchi,et al.  Privacy and Security Threats on the Internet of Things , 2019, Internet of Things Security and Data Protection.

[4]  George Basalla,et al.  Technology in World Civilization: A Thousand-Year History by Arnold Pacey (review) , 1992, Technology and Culture.

[5]  Pijush Kanti Dutta Pramanik,et al.  Internet of things, smart sensors, and pervasive systems: Enabling connected and pervasive healthcare , 2019, Healthcare Data Analytics and Management.

[6]  Philippe Aghion,et al.  Artificial Intelligence and Economic Growth , 2017, The Economics of Artificial Intelligence.

[7]  Damon McCoy,et al.  Tracking Ransomware End-to-end , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[8]  Torsten Schröder,et al.  Architecture and the Smart City , 2019 .

[9]  Antonio F. Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[10]  Ali Dehghantanha,et al.  Fuzzy pattern tree for edge malware detection and categorization in IoT , 2019, J. Syst. Archit..

[11]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[12]  Graham Neubig,et al.  Differentiable Reasoning over a Virtual Knowledge Base , 2020, ICLR.

[13]  Erik Brynjolfsson,et al.  The second machine age: work, progress, and prosperity in a time of brilliant technologies, 1st Edition , 2014 .

[14]  Bernhard Haslhofer,et al.  Ransomware Payments in the Bitcoin Ecosystem , 2018, J. Cybersecur..

[15]  Fahim Arif,et al.  Real-time data processing scheme using big data analytics in internet of things based smart transportation environment , 2019, J. Ambient Intell. Humaniz. Comput..

[16]  Balamurugan Balusamy,et al.  Wearable Devices and IoT , 2019, A Handbook of Internet of Things in Biomedical and Cyber Physical System.

[17]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[18]  Jinsoo Hwang,et al.  Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques , 2020, Wirel. Pers. Commun..

[19]  Hadis Karimipour,et al.  Applications of Big Data Analytics and Machine Learning in the Internet of Things , 2020, Handbook of Big Data Privacy.

[20]  Jianxiong Xiao,et al.  DeepDriving: Learning Affordance for Direct Perception in Autonomous Driving , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[21]  Priti Das,et al.  Healthcare 5.0: A Paradigm Shift in Digital Healthcare System Using Artificial Intelligence, IOT and 5G Communication , 2019, 2019 International Conference on Applied Machine Learning (ICAML).

[22]  Antonio Iera,et al.  Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm , 2017, Ad Hoc Networks.

[23]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[24]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[25]  Yinhai Wang,et al.  A Smart, Efficient, and Reliable Parking Surveillance System With Edge Artificial Intelligence on IoT Devices , 2020 .

[26]  N. Kshetri Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .

[27]  Patrick Traynor,et al.  CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[28]  Budi Arief,et al.  Ransomware deployment methods and analysis: views from a predictive model and human responses , 2019, Crime Science.

[29]  Sharad Agarwal,et al.  Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk , 2019, Sensors.

[30]  Choong Seon Hong,et al.  Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..

[31]  Ioan C. Bacivarov,et al.  Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry , 2017 .

[32]  Scott E. Fahlman,et al.  Knowledge-Driven Learning and Discovery , 2007, AAAI.

[33]  Cryptovirology: the birth, neglect, and explosion of ransomware , 2017 .

[34]  Francesca Lonetti,et al.  A Systematic Review on Cloud Testing , 2019, ACM Comput. Surv..

[35]  Murat Kantarcioglu,et al.  BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain , 2020, IJCAI.

[36]  Alessio Merlo,et al.  Towards energy-aware intrusion detection systems on mobile devices , 2013, 2013 International Conference on High Performance Computing & Simulation (HPCS).

[37]  Miss. Harshada U Salvi,et al.  Ransomware: A Cyber Extortion , 2016 .

[38]  Ali Tekeoglu,et al.  Artorias: IoT Security Testing Framework , 2019, 2019 26th International Conference on Telecommunications (ICT).

[39]  Yurong Liu,et al.  A survey of deep neural network architectures and their applications , 2017, Neurocomputing.

[40]  M. Babel,et al.  Development of a Generic Domestic Water Security Index, and Its Application in Addis Ababa, Ethiopia , 2018, Water.

[41]  Ali Dehghantanha,et al.  Towards secure model for SCADA systems , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[42]  Prabaharan Poornachandran,et al.  Deep learning LSTM based ransomware detection , 2017, 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).

[43]  Yuval Elovici,et al.  Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments , 2020, Neural Networks.

[44]  T. P. Hughes,et al.  The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .

[45]  Lida Xu,et al.  Big data for cyber physical systems in industry 4.0: a survey , 2019, Enterp. Inf. Syst..

[46]  P Thiyagarajan A Review on Cyber Security Mechanisms Using Machine and Deep Learning Algorithms , 2020 .

[47]  Azeem Ayaz Mirani,et al.  A Review of Agro-Industry in IoT: Applications and Challenges , 2019 .

[48]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[49]  J. Hernandez-Castro,et al.  An economic analysis of ransomware and its welfare consequences , 2020, Royal Society Open Science.

[50]  Tomislav Dragicevic,et al.  Future effectual role of energy delivery: A comprehensive review of Internet of Things and smart grid , 2018, Renewable and Sustainable Energy Reviews.

[51]  Brij B. Gupta,et al.  Security Threats and Recent Countermeasures in Cloud Computing , 2020 .

[52]  Shafii Muhammad Abdulhamid,et al.  Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms , 2019, Journal of Reliable Intelligent Environments.

[53]  Sakir Sezer,et al.  Evolution of ransomware , 2018, IET Networks.

[54]  Elisa Bertino,et al.  Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..

[55]  Fabio Massacci,et al.  MalwareLab: Experimentation with Cybercrime Attack Tools , 2013, CSET.

[56]  Neeraj Kumar,et al.  Machine Learning Models for Secure Data Analytics: A taxonomy and threat model , 2020, Comput. Commun..

[57]  S. Diamond In Search of the Primitive: A Critique of Civilization , 1979 .

[58]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[59]  Antonella Santone,et al.  Model checking for malicious family detection and phylogenetic analysis in mobile environment , 2020, Comput. Secur..

[60]  Alessandro Nuvolari,et al.  Collective invention during the British , 2004 .

[61]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[62]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[63]  Mohammad Ali Jabraeil Jamali,et al.  Some Cases of Smart Use of the IoT , 2019, Towards the Internet of Things.

[64]  Thaier Hayajneh,et al.  Hardware Security in IoT Devices with Emphasis on Hardware Trojans , 2019, J. Sens. Actuator Networks.

[65]  Quan Z. Sheng,et al.  Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies , 2020, IEEE Communications Surveys & Tutorials.

[66]  Shahaboddin Shamshirband,et al.  Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges , 2015, J. Netw. Comput. Appl..

[67]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[68]  Shalini Batra,et al.  Trust management in social Internet of Things: A taxonomy, open issues, and challenges , 2020, Comput. Commun..

[69]  Ram Mohana Reddy Guddeti,et al.  Resource Provisioning Framework for IoT Applications in Fog Computing Environment , 2018, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[70]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[71]  Hoan Quoc Nguyen-Mau,et al.  Recent advances on artificial intelligence and internet of things convergence for human-centric applications: internet of things science , 2018, IOT.

[72]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[73]  Scott J. Shackelford Smart Factories, Dumb Policy? Managing Cybersecurity and Data Privacy Risks in the Industrial Internet of Things , 2018 .

[74]  Rajkumar Buyya,et al.  Internet of Things (IoT) and New Computing Paradigms , 2018, Fog and Edge Computing.

[75]  Adeniyi Abidemi Emmanuel,et al.  Application of Smartphone Qrcode Scanner as a means of Authenticating Student Identity Card , 2020 .

[76]  A. M. Said,et al.  Consequences of the 2004 Indian Ocean Tsunami in Malaysia , 2020 .

[77]  Bander Ali Saleh Al-rimy,et al.  Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions , 2018, Comput. Secur..

[78]  C. D. Jaidhar,et al.  Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM , 2018 .

[79]  Aniello Cimitile,et al.  Talos: no more ransomware victims with formal methods , 2018, International Journal of Information Security.

[80]  Prem Prakash Jayaraman,et al.  Internet of Things and Edge Cloud Computing Roadmap for Manufacturing , 2016, IEEE Cloud Computing.

[81]  Julio Hernandez-Castro,et al.  Economic Analysis of Ransomware , 2017, ArXiv.

[82]  Li Da Xu,et al.  Industry 4.0: state of the art and future trends , 2018, Int. J. Prod. Res..

[83]  Hao Wang,et al.  Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies , 2019, Enterp. Inf. Syst..

[84]  Burak Kantarci,et al.  A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities , 2019, Sustainable Cities and Society.

[85]  Victor Hugo C. de Albuquerque,et al.  Artificial intelligence techniques empowered edge-cloud architecture for brain CT image analysis , 2020, Eng. Appl. Artif. Intell..

[86]  Norbert Wiener,et al.  Cybernetics. , 1948, Scientific American.

[87]  Robertas Damaševičius,et al.  An IOT-Based Architecture for Crime Management in Nigeria , 2019, Data, Engineering and Applications.

[88]  Ashish Khanna,et al.  The Role of Big Data Predictive Analytics and Radio Frequency Identification in the Pharmaceutical Industry , 2019, IEEE Access.

[89]  Garima Chopra,et al.  A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..

[90]  Tan Yigitcanlar,et al.  Can cities become smart without being sustainable? A systematic review of the literature , 2019, Sustainable Cities and Society.

[91]  Rajhans Mishra,et al.  Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges , 2019, Enterp. Inf. Syst..

[92]  Tu Bao Ho,et al.  Knowledge Acquisition by Machine Learning and Data Mining , 2007, Creative Environments.

[93]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[94]  Vinay Avasthi,et al.  Ransomware: A Rising Threat of new age Digital Extortion , 2015, ArXiv.

[95]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[96]  Juergen Jasperneite,et al.  The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 , 2017, IEEE Industrial Electronics Magazine.

[97]  Alessandro Nuvolari,et al.  Collective Invention during the British Industrial Revolution The Case of the Cornish Pumping Engine , 2004 .

[98]  Lamya Benamar,et al.  Internet of Things devices appropriation process: The Dynamic Interactions Value Appropriation (DIVA) framework , 2020 .

[99]  Tomáš Kvasňovský Autonomous Weapon Systems as the next revolution in warfare and implications of technology deployment for global security , 2020 .

[100]  Roseline Oluwaseun Ogundokun,et al.  Semantics-based clustering approach for similar research area detection , 2020, TELKOMNIKA (Telecommunication Computing Electronics and Control).

[101]  Alan Fowler,et al.  The role of AI-based technology in support of the knowledge management value activity cycle , 2000, J. Strateg. Inf. Syst..

[102]  Usha Devi Gandhi,et al.  A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases , 2017, Comput. Electr. Eng..

[103]  T Velásquez-Pérez,et al.  Good practice guide around the security of the internet of things in smart homes , 2019 .

[104]  Antonella Santone,et al.  Ransomware Inside Out , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[105]  Jin Song Dong,et al.  Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues , 2019, IEEE Communications Surveys & Tutorials.

[106]  Amit P. Sheth,et al.  Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.

[107]  Keonsoo Lee,et al.  A Study on Research Trends of Technologies for Industry 4.0; 3D Printing, Artificial Intelligence, Big Data, Cloud Computing, and Internet of Things , 2018, MUE/FutureTech.

[108]  Andrea Castillo O'Sullivan,et al.  Projecting the Growth and Economic Impact of the Internet of Things , 2015 .

[109]  Ercan Öztemel,et al.  Literature review of Industry 4.0 and related technologies , 2018, J. Intell. Manuf..

[110]  Thanh Cong Truong,et al.  Artificial Intelligence and Cybersecurity: Past, Presence, and Future , 2020, Advances in Intelligent Systems and Computing.

[111]  Giancarlo Fortino,et al.  On the Classification of Cyberphysical Smart Objects in the Internet of Things , 2014, UBICITEC.

[112]  Zubair A. Baig,et al.  Ransomware: Emergence of the cyber-extortion menace , 2015 .

[113]  Qihui Wu,et al.  Cognitive Internet of Things: A New Paradigm Beyond Connection , 2014, IEEE Internet of Things Journal.

[114]  Fernando Deschamps,et al.  Past, present and future of Industry 4.0 - a systematic literature review and research agenda proposal , 2017, Int. J. Prod. Res..

[115]  Patrick D. McDaniel,et al.  Program Analysis of Commodity IoT Applications for Security and Privacy , 2018, ACM Comput. Surv..

[116]  Kenrick Mock,et al.  Artificial Intelligence-Based Cybercrime , 2020 .

[117]  Sylvain Hallé,et al.  10 Years of IoT Malware: A Feature-Based Taxonomy , 2019, 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[119]  Michael I. Jordan,et al.  Machine learning: Trends, perspectives, and prospects , 2015, Science.

[120]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[121]  Farnaz Farid,et al.  Applying Internet of Things and Machine-Learning for Personalized Healthcare: Issues and Challenges , 2018, 2018 International Conference on Machine Learning and Data Engineering (iCMLDE).

[122]  Jason R. C. Nurse,et al.  The Social and Psychological Impact of Cyber-Attacks , 2019, Emerging Cyber Threats and Cognitive Vulnerabilities.

[123]  Roseline Oluwaseun Ogundokun,et al.  Evaluation of load balancing algorithms on overlappiing wireless accesspoints , 2021 .

[124]  Madhusanka Liyanage,et al.  Introduction to IoT , 2019, IoT Security.

[125]  Alessio Merlo,et al.  Measuring and estimating power consumption in Android to support energy-based intrusion detection , 2015, J. Comput. Secur..

[126]  Ejaz Ahmed,et al.  Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..

[127]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[128]  K. Desouza,et al.  Contributions and Risks of Artificial Intelligence (AI) in Building Smarter Cities: Insights from a Systematic Review of the Literature , 2020, Energies.

[129]  Farshad Firouzi,et al.  The Smart “Things” in IoT , 2020 .

[130]  Hani Alshahrani,et al.  An Intelligent Behavior-Based Ransomware Detection System For Android Platform , 2019, 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).

[131]  T. Sung Industry 4.0: A Korea perspective , 2017, Technological Forecasting and Social Change.

[132]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[133]  Ali Dehghantanha,et al.  Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.

[134]  Urvashi Garg,et al.  Advanced Petya Ransomware and Mitigation Strategies , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).

[135]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[136]  Foutse Khomh,et al.  Enforcing security in Internet of Things frameworks: A Systematic Literature Review , 2019, Internet Things.

[137]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[138]  Murat Kantarcioglu,et al.  BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain , 2019, ArXiv.

[139]  Jingyue Li,et al.  The AI-Based Cyber Threat Landscape , 2020, ACM Comput. Surv..

[140]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[141]  Victor I. Chang,et al.  Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..

[142]  Shane D. Johnson,et al.  A systematic review of crime facilitated by the consumer Internet of Things , 2019, Security Journal.

[143]  Charalampos D. Kokkinos,et al.  The Signification of Objects in the Context of a Critical Examination of Technological Civilization: An Interdisciplinary Approach , 2013 .

[144]  Sanmeet Kaur,et al.  Evolution of Internet of Things (IoT) and its significant impact in the field of Precision Agriculture , 2019, Comput. Electron. Agric..

[145]  Spyros Makridakis,et al.  The Forthcoming Artificial Intelligence (AI) Revolution: Its Impact on Society and Firms , 2017 .

[147]  Daron Acemoglu,et al.  Artificial Intelligence, Automation and Work , 2018 .

[148]  Ruchi Vishwakarma,et al.  A survey of DDoS attacking techniques and defence mechanisms in the IoT network , 2019, Telecommunication Systems.

[149]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[150]  Antonio Iera,et al.  A systemic and cognitive approach for IoT security , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[151]  Paul F. Cleary,et al.  Security Challenges in the 21st Century: The Changing Nature of Risk, Security and Sustainability , 2017, AHFE.

[152]  James R. Beniger The Control Revolution: Technological and Economic Origins of the Information Society , 1986 .

[153]  Ali Dehghantanha,et al.  Detecting crypto-ransomware in IoT networks based on energy consumption footprint , 2018, J. Ambient Intell. Humaniz. Comput..

[154]  M. Yar,et al.  Book Review: Cybercrime and Society , 2006 .

[155]  Ali Dehghantanha,et al.  Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware , 2018, ArXiv.

[156]  Mohammad Hossein Jarrahi,et al.  Artificial intelligence and the future of work: Human-AI symbiosis in organizational decision making , 2018, Business Horizons.

[157]  Hellesen Niclas,et al.  Cyber Situational Security Awareness Architecture (CSSA) for Industrial Control Systems , 2019 .

[158]  Martti Lehto,et al.  Artificial intelligence in the cyber security environment , 2019 .

[159]  Chandrakumar Thangavel,et al.  Security Challenges in the IoT Paradigm for Enterprise Information Systems , 2017 .

[160]  M. Harbers,et al.  The Internet of Things in a Smart Society: How Government Policy Can Help Seize Opportunities and Mitigate Threats , 2020 .

[161]  Ransomware: The Cyber Extortionist , 2018 .

[162]  Nikša Fafandjel,et al.  Toward shipbuilding 4.0 - an industry 4.0 changing the face of the shipbuilding industry , 2018 .

[163]  Laxmi B. Bhagwat,et al.  Detection of Ransomware Attack: A Review , 2020 .

[164]  Satinderjeet Singh,et al.  Embedding Machine & Deep Learning for Mitigating Security & Privacy Issues in IoT Enabled Devices & Networks , 2018 .

[165]  Sule Yildirim Yayilgan,et al.  Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[166]  Anthony C. Boucouvalas,et al.  Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture , 2011, Adv. Internet Things.

[167]  Seungmin Rho,et al.  A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services , 2017, Cluster Computing.

[168]  Nir Nissim,et al.  Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory , 2018, Expert Syst. Appl..

[169]  Thaier Hayajneh,et al.  Detection and prevention of crypto-ransomware , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).

[170]  Jerome Henry,et al.  IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things , 2017 .

[171]  Ali Dehghantanha,et al.  The Future of Blockchain Technology in Healthcare Internet of Things Security , 2020, Blockchain Cybersecurity, Trust and Privacy.

[172]  J. Haskel,et al.  The Internet of Things and economic growth in a panel of countries , 2019, Economics of Innovation and New Technology.

[173]  Athanasios V. Vasilakos,et al.  The role of big data analytics in Internet of Things , 2017, Comput. Networks.

[174]  Ali Selamat,et al.  A survey on malware propagation, analysis, and detection , 2013 .

[175]  Colin Tankard,et al.  The security issues of the Internet of Things , 2015 .

[176]  Neeraj Kumar,et al.  An Efficient Spam Detection Technique for IoT Devices Using Machine Learning , 2021, IEEE Transactions on Industrial Informatics.

[177]  Olatunji Okesola,et al.  A 3-D MODEL OF AN INSTITUTIONAL LOCATION NAVIGATION SYSTEM (NAVILOC) (A CASE STUDY OF COVENANT UNIVERSITY) , 2019 .

[178]  John M. Acken,et al.  Additional Security Considerations for Cloud , 2020 .

[179]  Friedemann Mattern,et al.  From the Internet of Computers to the Internet of Things , 2010, From Active Data Management to Event-Based Systems and More.

[180]  Ali Dehghantanha,et al.  Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection , 2018, ArXiv.