Anisetti et al., 2020
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
| US12244641B2 (en) | Application firewall | |
| US10924517B2 (en) | Processing network traffic based on assessed security weaknesses | |
| Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
| Anisetti et al. | Security threat landscape | |
| Karim et al. | Mobile botnet attacks-an emerging threat: Classification, review and open issues | |
| GB2574283A (en) | Detecting triggering events for distributed denial of service attacks | |
| Ibrahim | A review on the mechanism mitigating and eliminating internet crimes using modern technologies: Mitigating internet crimes using modern technologies | |
| Möller | Threats and threat intelligence | |
| Islam et al. | SYSTEMATIC REVIEW OF CYBERSECURITY THREATS IN IOT DEVICES FOCUSING ON RISK VECTORS VULNERABILITIES AND MITIGATION STRATEGIES | |
| Ahmad et al. | Security challenges from abuse of cloud service threat | |
| Russell | IoT cyber security | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Dhondge | Lifecycle IoT Security for Engineers | |
| GB2572471A (en) | Detecting lateral movement by malicious applications | |
| Chung | Emerging Cyber-Attacks | |
| Virvilis-Kollitiris | Detecting advanced persistent threats through deception techniques | |
| Patil et al. | Cyber Security Concerns for IoB | |
| Mosemann | Assessing Security Risks with the Internet of Things | |
| Duchaussoy | Security and Privacy Analysis of Parental Control Solutions | |
| Tapiador | Computer Security Fundamentals | |
| Rehan | Understanding Attacker Tactics and Framework-Aligned Defense Strategies in the Cloud Era of AI | |
| Thomas et al. | IoT Security: Challenges, Best Practices, and Service Platforms | |
| Shehab et al. | O-Cloud Security: A Comprehensive Survey of Threats, Mitigation Strategies, and Future Directions | |
| Stanciu et al. | Product Security: An Overview of Concepts and Challenges |