Funder
Princess Nourah bint Abdulrahman University
Reference23 articles.
1. A review of android malware detection approaches based on machine learning;Liu;IEEE Access,2020
2. Computational intelligence enabled cybersecurity for the internet of things;Zhao;IEEE Trans. Emerg. Top. Comput. Intell.,2020
3. Fuzzy pattern tree for edge malware detection and categorization in IoT;Dovom;J. Syst. Archit.,2019
4. VPNFilter Malware Analysis on Cyber Threat in Smart Home Network;Sapalo Sicato;Appl. Sci.,2019
5. Y. Shah and S. Sengupta, “A survey on Classification of Cyber-attacks on IoT and IIoT devices,” In 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, USA, pp. 0406–0413, 2020, doi: 10.1109/UEMCON51285.2020.9298138.