Nothing Special   »   [go: up one dir, main page]

Alamer, 2024 - Google Patents

A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources

Alamer, 2024

Document ID
11592201763137423634
Author
Alamer A
Publication year
Publication venue
Internet of Things

External Links

Snippet

The rise in malware attacks presents a growing security threat in today's digital landscape, emphasizing the need for advanced malware detection methodology. While numerous detection systems utilizing methodologies like machine learning (ML) have been developed …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Agyekum et al. A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain
Qin et al. LBAC: A lightweight blockchain-based access control scheme for the internet of things
Andola et al. Vulnerabilities on hyperledger fabric
Niu et al. Achieving data truthfulness and privacy preservation in data markets
Su et al. BA-RMKABSE: Blockchain-aided ranked multi-keyword attribute-based searchable encryption with hiding policy for smart health system
Liu et al. SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation
Fang et al. A privacy-preserving and verifiable federated learning method based on blockchain
Lin et al. Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications
Gao et al. SVeriFL: Successive verifiable federated learning with privacy-preserving
Miao et al. VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner
Hamouda et al. PPSS: A privacy-preserving secure framework using blockchain-enabled federated deep learning for industrial IoTs
Lyu et al. Towards fair and decentralized privacy-preserving deep learning with blockchain
Azad et al. M2m-rep: Reputation system for machines in the internet of things
Jiang et al. Anonymous and efficient authentication scheme for privacy-preserving distributed learning
Alamer A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources
Feng et al. Blockchain data privacy access control based on searchable attribute encryption
Guo et al. R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity
Wu et al. Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud
Olakanmi et al. Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things
Xia et al. A secure and efficient authenticated key exchange scheme for smart grid
Wan et al. Towards privacy-preserving and verifiable federated matrix factorization
Sharma et al. A blockchain based secure communication framework for community interaction
Liu et al. Secure three-party computational protocols for triangle area
Keshavarzkalhori et al. Federify: a verifiable federated learning scheme based on zksnarks and blockchain
Wang et al. A lightweight certificateless aggregate ring signature scheme for privacy protection in smart grids