Latest Publications & Patents on Cybersecurity

Cybersecurity

Tip: further to this selection on Aeronautics, you can search and filter our:
    * free publications search tool * by author, topic, keywords, date or journal.
    * free patents search tool * for patents in English from the European Patent Office.

This is our latest selection of worldwide publications and patents in english on Cybersecurity, between many scientific online journals, classified and focused on cybersecurity, malware, phishing, firewall, encryption, zero-day exploit, denial of service, data breach and threat intelligence.

Comprehensive Study of IoT Vulnerabilities and Countermeasures

Published on 2025-03-11 by Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian @MDPI

Abstract: This comprehensive study provides an in-depth examination of the Internet of Things (IoT), which refers to the interconnection of multiple devices through various wireless protocols that facilitate data transfer and improve operational intelligence. IoT is widely used in numerous fields, including urban infrastructure, domestic settings, transportation systems, military operations, healthcare, and agriculture. However, with its growing prevalence comes a significant increase in security risks ac[...]


Our summary: In-depth examination of IoT vulnerabilities and countermeasures, categorizing risks and exploring mitigation strategies, advancing security in IoT environments.

IoT, vulnerabilities, countermeasures, security

Publication

Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption

Published on 2025-03-11 by Duc Hung Pham, Mai The Vu @MDPI

Abstract: This study introduces a novel control framework based on the Takagi–Sugeno–Kang wavelet fuzzy neural network, integrating brain imitated network and cerebellar network. The proposed controller demonstrates high robustness, making it an excellent candidate for handling intricate nonlinear dynamics, effectively mapping input–output relationships and efficiently learning from data. To enhance its performance, the controller’s parameters are fi[...]


Our summary: Novel control framework based on Takagi-Sugeno-Kang wavelet fuzzy neural network, high robustness, parameters fine-tuned using Lyapunov stability theory, superior learning capabilities and outstanding performance metrics, synchronization technique applied to secure transmission of medical images, experimental results confirm effectiveness and reliability.

Takagi-Sugeno-Kang, Fuzzy Neural Network, Secure Medical Image Encryption, Nonlinear Chaotic Systems

Publication

Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration

Published on 2025-03-10 by Jinyong Park, Byeongjo Park, Tae-Sung Kim @MDPI

Abstract: A firewall is a device that is used generally to prevent cyberattacks and protect internal assets by blocking unauthorized access. Information security managers have many difficulties in managing firewall policies due to errors or anomalies in the policy that are caused by frequent internal and external requests. This paper intends to develop an anomaly classification model to detect anomalies and measure the priority of resolution in firewall policy as well as a visualized tool that supports in[...]


Our summary: Development of Anomaly Classification Model and Decision Support Tool for Firewall Policy Configuration. Detect and prioritize anomalies in firewall policy. Visualized tool for efficient management of firewall policy. Protect internal assets effectively.

Firewall, Anomaly Classification, Decision Support Tool, Policy Configuration

Publication

A Transformer-Based Model for Encrypted Traffic Classification

Published on 2025-03-10 by Ziao Liu, Yuanyuan Xie, Yanyan Luo, Yuxin Wang, Xiangmin Ji @MDPI

Abstract: Encrypted network traffic classification remains a critical component in network security monitoring. However, existing approaches face two fundamental limitations: (1) conventional methods rely on manual feature engineering and are inadequate in handling high-dimensional features; and (2) they lack the capability to capture dynamic temporal patterns. This paper introduces TransECA-Net, a novel hybrid deep learning architecture that addresses these limitations through two key innovations. First,[...]


Our summary: A novel hybrid deep learning architecture, TransECA-Net, addresses limitations in encrypted network traffic classification by integrating ECA-Net modules with CNN architecture and incorporating a Transformer encoder to model global temporal dependencies. Extensive experiments demonstrate superior performance in classifying encrypted traffic types and faster convergence speed during training. This framework enables fine-grained service identification of encrypted traffic and real-time responsiveness, supporting adaptive network security monitoring systems.

Transformer-Based Model, Encrypted Traffic Classification, Deep Learning, Network Security

Publication

Utilizing Transformer and SeqGAN for Detecting and Classifying Document Type Malware

Published on 2025-03-10 by Gati Lother Martin, Sang-Min Lee, Jong-Hyun Kim, Young-Seob Jeong, Ah Reum Kang, Jiyoung Woo @MDPI

Abstract: The prevalence of non-executable malware is on the rise, presenting a major threat to users, including major public institutions and corporations. While extensive research has been conducted on detecting malware threats, there is a noticeable gap in studying document-type malware compared with executable files. The proposed model will solve this gap by detecting and classifying document-type malware families using script codes, including tags, to write documents and script languages to execute m[...]


Our summary: Detecting and classifying document-type malware families using script codes, leveraging language models, and addressing class imbalance with a generative adversarial network.

Transformer, SeqGAN, Malware, Document-type

Publication

A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection

Published on 2025-03-10 by Mohammed Asiri, Maher A. Khemakhem, Reemah M. Alhebshi, Bassma S. Alsulami, Fathy E. Eassa @MDPI

Abstract: The proliferation of Internet of Things (IoT) devices and their vulnerability to malware infections pose critical security challenges in IoT networks and multi-access edge computing (MEC). Traditional federated learning-based IoT malware detection (FL-IMD) methods face limitations in privacy, reliability, and client authentication, necessitating innovative solutions. This study proposes a reliable and privacy-preserving federated learning framework (RPFL) that integrates elliptic curve digital s[...]


Our summary: A study proposes a reliable and privacy-preserving federated learning framework integrating ECDSA, homomorphic encryption, and blockchain technology. Experimental results show RPFL achieves high accuracy in IoT malware detection while enhancing reliability and privacy. RPFL outperforms BCFL in reducing communication costs and latency.

federated learning, IoT malware detection, privacy-preserving framework, reliability

Publication

Network-independent dynamic encryption

Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])

Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]


Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.

dynamic encryption, digital documents, GPS chip, quick response code

Patent

Method and apparatus for confirming boarding of passenger in uam environment

Patent published on the 2025-03-06 in WO under Ref WO2025048366 by KIA CORP [KR] (Jung Chang Hun [kr], Park Seung Wook [kr])

Abstract: A method and an apparatus for confirming boarding of a passenger in a UAM environment are disclosed. According to one aspect of the present disclosure, the provided method, which is performed by a fuselage system supporting a function of checking whether a user has boarded a fuselage and taken a reserved seat, comprises the steps of: receiving, from a user terminal, a first encryption token including reservation information of the user and identification proof information; receiving, from a flig[...]


Our summary: Method and apparatus for confirming boarding of passenger in UAM environment by using encryption tokens and symmetric key to verify user reservation and seat allocation.

boarding, passenger, UAM, fuselage

Patent

Table of Contents
    Add a header to begin generating the table of contents

    DESIGN or COST CHALLENGE?
    Senior Product Designer or R&D Manager.
    Effective product development

    Available on short notice in France & Swiss.
    Contact me on LinkedIn
    Design-to-cost, Ergonomics, Medium to high-volume, Regulated industries, CE & FDA, CAD, Solidworks, Lean Sigma Black Belt, medical ISO 13485 Class II & III

    University ?
    Institution ?

    Would you like to become a partner of this site by hosting it?
    > send us a message <

    Topics covered: Cybersecurity, malware, phishing, firewall, encryption, zero-day exploit, denial of service, data breach, threat intelligence, anomaly classification, deep learning, IoT, Federated Learning, ECDSA, homomorphic encryption, blockchain, privacy-preserving framework, threat modeling

    en_USEN
    Scroll to Top