April 17, 2024, 4:10 a.m. | Sreenitha Kasarapu, Sanket Shukla, Sai Manoj Pudukotai Dinakarrao

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.10012v1 Announce Type: new
Abstract: In recent years, networked IoT systems have revo- lutionized connectivity, portability, and functionality, offering a myriad of advantages. However, these systems are increasingly targeted by adversaries due to inherent security vulnerabilities and limited computational and storage resources. Malicious applications, commonly known as malware, pose a significant threat to IoT devices and networks. While numerous malware detection techniques have been proposed, existing approaches often overlook the resource constraints inherent in IoT environ- ments, assuming abundant resources …

adversaries applications arxiv aware computational computing connectivity cs.cr cs.dc detection distributed distributed computing iot malicious malware malware detection networks resource resources security storage systems vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Architect - Northwest region (Remote)

@ GuidePoint Security LLC | Remote

Senior Consultant, Cyber Security Architecture

@ 6point6 | Manchester, United Kingdom

Junior Security Architect

@ IQ-EQ | Port Louis, Mauritius

Senior Detection & Response Engineer

@ Expel | Remote

Cyber Security Systems Engineer ISSE Splunk

@ SAP | Southbank (Melbourne), VIC, AU, 3006