Detecting crypto-ransomware in IoT networks based on energy consumption footprint
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
Authors
Keywords
Ransomware detection, Power consumption, Internet of Things security, Machine learning, Malware detection, Android
Journal
Journal of Ambient Intelligence and Humanized Computing
Volume -, Issue -, Pages -
Publisher
Springer Nature
Online
2017-08-23
DOI
10.1007/s12652-017-0558-5
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps
- (2018) Christian J. D’Orazio et al. Future Generation Computer Systems-The International Journal of eScience
- Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies
- (2017) Christian J. D'Orazio et al. IEEE Internet of Things Journal
- Internet of Things (IoT)
- (2016) Elisa Bertino et al. ACM Transactions on Internet Technology
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
- (2016) Luca Caviglione et al. IEEE Transactions on Information Forensics and Security
- A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
- (2016) Hamed Haddad Pajouh et al. IEEE Transactions on Emerging Topics in Computing
- Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
- (2015) Farhood Norouzizadeh Dezfouli et al. Australian Journal of Forensic Sciences
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Android Security: A Survey of Issues, Malware Penetration, and Defenses
- (2015) Parvez Faruki et al. IEEE Communications Surveys and Tutorials
- A survey on energy-aware security mechanisms
- (2015) Alessio Merlo et al. Pervasive and Mobile Computing
- Security of the Internet of Things: perspectives and challenges
- (2014) Qi Jing et al. WIRELESS NETWORKS
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- Evolution, Detection and Analysis of Malware for Smart Devices
- (2013) Guillermo Suarez-Tangil et al. IEEE Communications Surveys and Tutorials
- A review on time series data mining
- (2010) Tak-chung Fu ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- Mining data with random forests: A survey and results of new tests
- (2010) A. Verikas et al. PATTERN RECOGNITION
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now