A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction

Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware

Saved in:
Bibliographic Details
Main Authors: Chimeleze C.U., Jamil N., Ismail R., Lam K.-Y.
Other Authors: 57222127806
Format: Conference Paper
Published: Springer Science and Business Media Deutschland GmbH 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
Description
Summary:Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware