all InfoSec news
Real-time Threat Detection Strategies for Resource-constrained Devices
March 25, 2024, 4:11 a.m. | Mounia Hamidouche, Biniam Fisseha Demissie, Bilel Cherif
cs.CR updates on arXiv.org arxiv.org
Abstract: As more devices connect to the internet, it becomes crucial to address their limitations and basic security needs. While much research focuses on utilizing ML and DL to tackle security challenges, there is often a tendency to overlook the practicality and feasibility of implementing these methods in real-time settings. This oversight stems from the constrained processing power and memory of certain devices (IoT devices), as well as concerns about the generalizability of these approaches. Focusing …
address arxiv basic challenges connect cs.cr detection devices internet limitations real research resource security security challenges strategies threat threat detection
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Product Regulatory Compliance Specialist
@ Avery Dennison | Oegstgeest, Netherlands
Cyber Security Analyst
@ FinClear | Melbourne, Australia
Senior Application Security Manager, United States-(Virtual)
@ Stanley Black & Decker | New Britain CT USA - 1000 Stanley Dr
Vice President - Information Security Management - FedRAMP
@ JPMorgan Chase & Co. | Chicago, IL, United States
Vice President, Threat Intelligence & AI
@ Arctic Wolf | Remote - Minnesota
Cybersecurity Analyst
@ Resource Management Concepts, Inc. | Dahlgren, Virginia, United States