2022 Applied Informatics International Conference (AiIC) 2022
DOI: 10.1109/aiic54368.2022.9914605
|View full text |Cite
|
Sign up to set email alerts
|

Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 20 publications
0
6
1
Order By: Relevance
“…This indicates that the approach is able to learn and adapt to new types of malware as it is trained on more diverse datasets. Compared to results obtained in studies (4,5,17) , the proposed approach performed better in terms of accuracy, presession and recall…”
Section: Resultscontrasting
confidence: 56%
See 1 more Smart Citation
“…This indicates that the approach is able to learn and adapt to new types of malware as it is trained on more diverse datasets. Compared to results obtained in studies (4,5,17) , the proposed approach performed better in terms of accuracy, presession and recall…”
Section: Resultscontrasting
confidence: 56%
“…Nonetheless, these methods have trouble dealing with malware's ongoing evolution (4) . Existing machine learning algorithms may have difficulty correctly detecting and classifying new malware variants as they are developed and released (5) .…”
Section: Introductionmentioning
confidence: 99%
“…In [9], it is expand the areas of smart technologies. Such systems typically use the Secure Sockets Layer (SSL)/Transport Level Security (TLS) (SSL/TLS) protocol stack to provide security services, which allows providing authentication, integrity, and confidentiality services [1][2][3][4][5]. This stack is formed on complex symmetric algorithms that simultaneously provide both encryption and generation of MAC codes [1,[6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…At the transport layer in cyber-physical systems, the TLS protocol provides tunnel mode during the authentication process. In addition, at the transport level, the SL/TLS stack is used in public key infrastructure (PKI) technologies, provides transparent data transfer between end users, and also provides reliable data transfer to higher levels [4,6,[9][10][11]. SSL cryptographic protocols and TLS transport layer security provide data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers and software applications running across the network.…”
Section: Introductionmentioning
confidence: 99%
“…Another existing method to avoid malware injection attacks against hypervisors is the advanced cloud protection system (ACPS) (17) . In ACPS the recorder module warns other multiple recorder module about the security risks and saves all the threats and risks in a warning pool.…”
Section: Introductionmentioning
confidence: 99%