no code implementations • 15 Feb 2024 • Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta
SMS phishing, also known as "smishing", is a growing threat that tricks users into disclosing private information or clicking into URLs with malicious content through fraudulent mobile text messages.
no code implementations • 3 Jul 2023 • Maanak Gupta, CharanKumar Akiri, Kshitiz Aryal, Eli Parker, Lopamudra Praharaj
The paper also investigates how cyber offenders can use the GenAI tools in developing cyber attacks, and explore the scenarios where ChatGPT can be used by adversaries to create social engineering attacks, phishing attacks, automated hacking, attack payload generation, malware creation, and polymorphic malware.
no code implementations • 4 Jul 2022 • Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu
An increasing body of work has recognized the importance of exploiting machine learning (ML) advancements to address the need for efficient automation in extracting access control attributes, policy mining, policy verification, access decisions, etc.
no code implementations • 21 Dec 2021 • Bikram Pratim Bhuyan, Ravi Tomar, Maanak Gupta, Amar Ramdane-Cherif
In order to provide the agricultural industry with the infrastructure it needs to take advantage of advanced technology, such as big data, the cloud, and the internet of things (IoT); smart farming is a management concept that focuses on providing the infrastructure necessary to track, monitor, automate, and analyse operations.
no code implementations • 22 Jun 2021 • Deepti Gupta, Maanak Gupta, Smriti Bhatt, Ali Saman Tosun
We propose Hidden Markov Model (HMM) based anomaly detection that analyzes normal user behavior in the context of RPM comprising both smart home and smart health devices, and identifies anomalous user behavior.
no code implementations • 19 May 2021 • Jeffrey C Kimmell, Mahmoud Abdelsalam, Maanak Gupta
The variety of services and functionality offered by various cloud service providers (CSP) have exploded lately.
no code implementations • 20 Jul 2020 • Deepti Gupta, Smriti Bhatt, Maanak Gupta, Ali Saman Tosun
IoT and smart connected technologies together with data-driven applications can play a crucial role not only in prevention, continuous monitoring, and mitigation of the disease, but also enable prompt enforcement of guidelines, rules and government orders to contain such future outbreaks.
Computers and Society
no code implementations • 13 Apr 2020 • Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal
Internet of Things is a revolutionary domain that has the caliber to impact our lives and bring significant changes to the world.
no code implementations • 15 Feb 2020 • Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal
Cloud Infrastructure as a Service (IaaS) is vulnerable to malware due to its exposure to external adversaries, making it a lucrative attack vector for malicious actors.