April 17, 2024, 4:10 a.m. | Sreenitha Kasarapu, Sanket Shukla, Sai Manoj Pudukotai Dinakarrao

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.10012v1 Announce Type: new
Abstract: In recent years, networked IoT systems have revo- lutionized connectivity, portability, and functionality, offering a myriad of advantages. However, these systems are increasingly targeted by adversaries due to inherent security vulnerabilities and limited computational and storage resources. Malicious applications, commonly known as malware, pose a significant threat to IoT devices and networks. While numerous malware detection techniques have been proposed, existing approaches often overlook the resource constraints inherent in IoT environ- ments, assuming abundant resources …

adversaries applications arxiv aware computational computing connectivity cs.cr cs.dc detection distributed distributed computing iot malicious malware malware detection networks resource resources security storage systems vulnerabilities

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior - Penetration Tester

@ Deloitte | Madrid, España

Associate Cyber Incident Responder

@ Highmark Health | PA, Working at Home - Pennsylvania

Senior Insider Threat Analyst

@ IT Concepts Inc. | Woodlawn, Maryland, United States