Alamer, 2024 - Google Patents
A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resourcesAlamer, 2024
- Document ID
- 11592201763137423634
- Author
- Alamer A
- Publication year
- Publication venue
- Internet of Things
External Links
Snippet
The rise in malware attacks presents a growing security threat in today's digital landscape, emphasizing the need for advanced malware detection methodology. While numerous detection systems utilizing methodologies like machine learning (ML) have been developed …
- 238000001514 detection method 0 title abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agyekum et al. | A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain | |
Qin et al. | LBAC: A lightweight blockchain-based access control scheme for the internet of things | |
Andola et al. | Vulnerabilities on hyperledger fabric | |
Niu et al. | Achieving data truthfulness and privacy preservation in data markets | |
Su et al. | BA-RMKABSE: Blockchain-aided ranked multi-keyword attribute-based searchable encryption with hiding policy for smart health system | |
Liu et al. | SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation | |
Fang et al. | A privacy-preserving and verifiable federated learning method based on blockchain | |
Lin et al. | Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications | |
Gao et al. | SVeriFL: Successive verifiable federated learning with privacy-preserving | |
Miao et al. | VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner | |
Hamouda et al. | PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for industrial IoTs | |
Lyu et al. | Towards fair and decentralized privacy-preserving deep learning with blockchain | |
Azad et al. | M2m-rep: Reputation system for machines in the internet of things | |
Jiang et al. | Anonymous and efficient authentication scheme for privacy-preserving distributed learning | |
Alamer | A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources | |
Feng et al. | Blockchain data privacy access control based on searchable attribute encryption | |
Guo et al. | R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity | |
Wu et al. | Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud | |
Olakanmi et al. | Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things | |
Xia et al. | A secure and efficient authenticated key exchange scheme for smart grid | |
Wan et al. | Towards privacy-preserving and verifiable federated matrix factorization | |
Sharma et al. | A blockchain based secure communication framework for community interaction | |
Liu et al. | Secure three-party computational protocols for triangle area | |
Keshavarzkalhori et al. | Federify: a verifiable federated learning scheme based on zksnarks and blockchain | |
Wang et al. | A lightweight certificateless aggregate ring signature scheme for privacy protection in smart grids |