Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
The emergence of Internet of Things (IoT) can facilitate and revolutionize various aspects of people’s lives. However, most IoT devices are vulnerable to botnet attacks. To defend these devices against botnet attacks, first approach is to detect the transmission rate of the botnet infection based...
| Main Author: | Ibrahim, Mohammed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/104062/ http://psasir.upm.edu.my/id/eprint/104062/1/FSKTM%202022%207%20IR.pdf |
Similar Items
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
by: Uwadiegwu, Inyama Victor
Published: (2019)
by: Uwadiegwu, Inyama Victor
Published: (2019)
Energy-efficient clock synchronization technique for IoT
by: Onyeka, Ezema Ernest
Published: (2019)
by: Onyeka, Ezema Ernest
Published: (2019)
Data work: how energy advisors and clients make IoT data accountable
by: Fischer, Joel E., et al.
Published: (2017)
by: Fischer, Joel E., et al.
Published: (2017)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Accountable Internet of things?: outline of the IoT Databox model
by: Crabtree, Andy, et al.
Published: (2017)
by: Crabtree, Andy, et al.
Published: (2017)
Building accountability into the Internet of Things: the
IoT Databox model
by: Crabtree, Andy, et al.
Published: (2018)
by: Crabtree, Andy, et al.
Published: (2018)
A day in the life of things in the home
by: Crabtree, Andy, et al.
Published: (2016)
by: Crabtree, Andy, et al.
Published: (2016)
Random access control schemes for massive machine type communications in cellular IOT networks
by: Althumali, Huda Dakhilallah A
Published: (2022)
by: Althumali, Huda Dakhilallah A
Published: (2022)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
by: Abdul Razak, Aina Nabila
Published: (2019)
by: Abdul Razak, Aina Nabila
Published: (2019)
Harnessing the digital records of everyday things
by: Darzentas, Dimitrios, et al.
Published: (2016)
by: Darzentas, Dimitrios, et al.
Published: (2016)
Internet of things and industrial applications for precision machining
by: Benardos, Panorios, et al.
Published: (2017)
by: Benardos, Panorios, et al.
Published: (2017)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Unpacking the sociotechnical challenges of IoT design work in practice
by: Castle-Green, Teresa
Published: (2023)
by: Castle-Green, Teresa
Published: (2023)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
by: Nwogbaga, Nweso Emmanuel
Published: (2023)
by: Nwogbaga, Nweso Emmanuel
Published: (2023)
“Just whack it on until it gets hot”: working with IoT data in the home
by: Fischer, Joel E., et al.
Published: (2016)
by: Fischer, Joel E., et al.
Published: (2016)
A security transmission and storage solution about sensing image for blockchain in the internet of things
by: Li, Yunfa, et al.
Published: (2020)
by: Li, Yunfa, et al.
Published: (2020)
The lives of objects: designing for meaningful things
by: Darzentas, Dimitrios Paris
Published: (2018)
by: Darzentas, Dimitrios Paris
Published: (2018)
Design of cloud-enabled cross-platform malware analysis systems
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
by: Najafabadi, Seyed Abdolrahman Mousavian
Published: (2016)
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Digitally enhanced consumer packaged goods: a data-inspired ideation approach
by: Berumen Salazar, Jose Gustavo
Published: (2022)
by: Berumen Salazar, Jose Gustavo
Published: (2022)
New directions in information technology law: learning from human–computer interaction
by: Urquhart, Lachlan, et al.
Published: (2017)
by: Urquhart, Lachlan, et al.
Published: (2017)
Customizing hybrid products
by: Benford, Steve, et al.
Published: (2018)
by: Benford, Steve, et al.
Published: (2018)
Internet of things-based soil sensing platform for Ganoderma boninense infection detection in oil palm seedlings using machine learning
by: Abdul Aziz, Mohd Hamim
Published: (2021)
by: Abdul Aziz, Mohd Hamim
Published: (2021)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
Modular wireless trackside signalling system: towards Rail Internet of Things (RIoT)
by: Mendez Villalon, Armando
Published: (2020)
by: Mendez Villalon, Armando
Published: (2020)
A mobility management scheme for proxy mobile IPv6 wireless sensor networks
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
Augmenting a guitar with its digital footprint
by: Benford, Steve, et al.
Published: (2015)
by: Benford, Steve, et al.
Published: (2015)
How to design Internet of Things to encourage office workers to take more regular micro-breaks
by: Huang, Yitong
Published: (2016)
by: Huang, Yitong
Published: (2016)
Edge computing techniques for classification based multi-task incremental learning
by: Dube, Swaraj Sunilkumar
Published: (2023)
by: Dube, Swaraj Sunilkumar
Published: (2023)
Interactive cultural narratives: unveiling the potential of the 3D serious game maker tool for Kristang culture
by: Abdulrazic, Mostafa Osama Mostafa
Published: (2025)
by: Abdulrazic, Mostafa Osama Mostafa
Published: (2025)
Convolutional Long Short-Term Memory for fileless malware detection
by: Kareegalan, Kunaprasan
Published: (2024)
by: Kareegalan, Kunaprasan
Published: (2024)
The use of advanced communications and internet technology in car transportation to facilitate improvements for both driver and passengers
by: Saftah, Rehab Omar
Published: (2015)
by: Saftah, Rehab Omar
Published: (2015)
Design fiction for mixed-reality performances
by: Rostami, Asreen, et al.
Published: (2017)
by: Rostami, Asreen, et al.
Published: (2017)
Living with interpersonal data: observability and accountability in the age of pervasive ICT
by: Goulden, Murray, et al.
Published: (2017)
by: Goulden, Murray, et al.
Published: (2017)
Learning from the veg box: designing unpredictability in agency delegation
by: Verame, Jhim Kiel M., et al.
Published: (2018)
by: Verame, Jhim Kiel M., et al.
Published: (2018)
Hybrid analysis approach using Graphical Model Structure Learning and Structural Equation Modelling for CloudIoT-based healthcare adoption model in Jordan
by: Altawaiha, Iyad Mahmoud Mohammad
Published: (2024)
by: Altawaiha, Iyad Mahmoud Mohammad
Published: (2024)
Similar Items
-
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
by: Uwadiegwu, Inyama Victor
Published: (2019) -
Energy-efficient clock synchronization technique for IoT
by: Onyeka, Ezema Ernest
Published: (2019) -
Data work: how energy advisors and clients make IoT data accountable
by: Fischer, Joel E., et al.
Published: (2017) -
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023) -
Accountable Internet of things?: outline of the IoT Databox model
by: Crabtree, Andy, et al.
Published: (2017)