• ClipSaver
  • dtub.ru
ClipSaver
Русские видео
  • Смешные видео
  • Приколы
  • Обзоры
  • Новости
  • Тесты
  • Спорт
  • Любовь
  • Музыка
  • Разное
Сейчас в тренде
  • Фейгин лайф
  • Три кота
  • Самвел адамян
  • А4 ютуб
  • скачать бит
  • гитара с нуля
Иностранные видео
  • Funny Babies
  • Funny Sports
  • Funny Animals
  • Funny Pranks
  • Funny Magic
  • Funny Vines
  • Funny Virals
  • Funny K-Pop

From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah скачать в хорошем качестве

From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah 1 год назад

скачать видео

скачать mp3

скачать mp4

поделиться

телефон с камерой

телефон с видео

бесплатно

загрузить,

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah
  • Поделиться ВК
  • Поделиться в ОК
  •  
  •  


Скачать видео с ютуб по ссылке или смотреть без блокировок на сайте: From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah в качестве 4k

У нас вы можете посмотреть бесплатно From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:

  • Информация по загрузке:

Скачать mp3 с ютуба отдельным файлом. Бесплатный рингтон From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah в формате MP3:


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah

Recorded as part of the May 10 Cybersecurity Revolution (SECREV) event for #cybersecurity research with introduction by Sumit Kundu, Strategic Collaborations & Partnership Development Officer Securing these interconnected environments has become paramount in the era of ubiquitous #InternetOfThings (IoT) devices. This talk concentrates on the complexities and challenges of #IoTSecurity, underscored by the exponential growth of devices and their diverse applications across sectors such as smart homes, healthcare, and transportation. We illuminate the cutting-edge methodologies employed in IoT device profiling, fingerprinting, and behavioural analysis through a detailed examination of four recently published #datasets. These datasets offer a foundation for understanding device behaviours under various scenarios, including attack simulations, and enhance our ability to conduct vulnerability assessments and develop robust security frameworks. This presentation aims to equip researchers, developers, and cybersecurity professionals with the knowledge and tools needed to strengthen IoT ecosystems against emerging threats by exploring the convergence of machine-learning approaches, real-time data analysis, and comprehensive attack documentation. Dr. Sajjad Dadkhah is an accomplished Assistant Professor, cybersecurity R&D team leader, and faculty member at the Canadian Institute of Cybersecurity, University of New Brunswick. With a career spanning over 10 years, Dadkhah has made significant contributions in the fields of digital multimedia security, computer security, and machine learning-based detection systems. Throughout his career, Dadkhah has held roles in various prestigious organizations, including Kyushu University (Japan), Universiti Malaya, IRIS Smart Technology Complex, and Kyushu Institute of Technology (Japan). His expertise as a team leader, researcher, and security consultant has been instrumental in the success of numerous security projects. In recognition of his research capabilities, Dadkhah was awarded a fellowship by the Kyushu Institute of Technology in 2016, allowing him to continue his research for 2 years. As a testament to his dedication and expertise, he has served as the Managing Editor and Board member of Applied Soft Computing, a renowned Elsevier journal, since 2016. As a research coordinator and team lead at CIC, Dadkhah has spearheaded several academic and industrial cybersecurity research projects. His research endeavours have encompassed various areas, including IoT device profiling in smart transportation pathways, security of data provenance and machine learning for IoT, and the development of Deep Defender-AI-driven hostile detection applications. Dadkhah led the CIC-Deep Defender AI project, focused on detecting fake news through advanced artificial intelligence algorithms. Additionally, he played a role in the creation of 3 cybersecurity datasets, furthering the advancement of the field. Notably, he led 2 NRC-CIC projects, specializing in IoT profiling and intrusion detection systems in vehicle networks, as well as the development of an IoT network traffic analyzer pipeline. Dadkhah's contributions extend beyond academia, as he led the TruthSeeker project, the largest social media ground-truth real/fake project to date. Furthermore, he pioneered a multimodal framework for early fake news detection, showcasing his commitment to combating misinformation in the digital age. Over the past 2 years, Dadkhah's research has focused on security in AI-driven algorithms, security in the IoT domain, multimedia security and forensics, and the development of IDS and malware detection algorithms. With an unwavering passion for advancing cybersecurity and protecting digital systems, Dadkhah has established himself as a leading authority in the field of cybersecurity and security in IoT. Through his research contributions, leadership, and dedication, he continues to drive innovation and shape the future of cybersecurity. Cybersecurity Revolution (SECREV), https://www.serene-risc.ca/secrev.org... Other SECREV recordings,    / @hc2p   https://www.unb.ca/cic/datasets/iotda... https://www.unb.ca/cic/datasets/iotda... https://www.unb.ca/cic/datasets/iomt-... https://www.unb.ca/cic/datasets/iov-d... https://www.unb.ca/cic/datasets/evse-... #TechTalk   / cic_unb   https://fb.me/cicunbca   / canadian_institute_cybersecurity   https://www.unb.ca/cic/ 0:00 Intro 1:32 Opening 2:14 What is IoT 3:27 IoT Statistics 4:30 CIC IoT Group 7:00 IoT Profiling vs Networking Monitoring 9:36 Challenges 15:39 Security in AI IoT 18:38 Large-scale Attack in IoT Environment 23:14 IoT in Healthcare 23:50 CIC IoT Profiling Dataset 2022 24:24 CIC IoT Attack Dataset 2023 24:36 CIC IoMT Healthcare 2024 25:27 CIC IoV Attack 2024 25:54 CIC IoV EV Charger 2024 26:09 Closing 26:23 Q&A

Comments
  • IoTProMo: Securing IoT Networks using Device Profiling and Monitoring by Alireza Zohourian 1 год назад
    IoTProMo: Securing IoT Networks using Device Profiling and Monitoring by Alireza Zohourian
    Опубликовано: 1 год назад
  • Webinar. Integrating social data into ocean accounts 1 месяц назад
    Webinar. Integrating social data into ocean accounts
    Опубликовано: 1 месяц назад
  • Securing Substations with Trust, Risk Posture, and Multi-Agent Systems by Dr. K. Boakye-Boateng 1 год назад
    Securing Substations with Trust, Risk Posture, and Multi-Agent Systems by Dr. K. Boakye-Boateng
    Опубликовано: 1 год назад
  • The Next Cyber Era by Rajiv Gupta 3 месяца назад
    The Next Cyber Era by Rajiv Gupta
    Опубликовано: 3 месяца назад
  • Renewable Energy Value Chains & South Africa’s Energy Transition | GTAC Webinar 4 месяца назад
    Renewable Energy Value Chains & South Africa’s Energy Transition | GTAC Webinar
    Опубликовано: 4 месяца назад
  • LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры 1 год назад
    LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры
    Опубликовано: 1 год назад
  • Deep Learning for intrusion detection in emerging technologies with Dr. Euclides Neto 4 недели назад
    Deep Learning for intrusion detection in emerging technologies with Dr. Euclides Neto
    Опубликовано: 4 недели назад
  • Building Emotional Resilience in Difficult Conversations | Ask an Expert Yorkville University 5 лет назад
    Building Emotional Resilience in Difficult Conversations | Ask an Expert Yorkville University
    Опубликовано: 5 лет назад
  • Cyber Attribution Data Centre (CADC): The Future of Identifying Cyber Threat Actors 1 месяц назад
    Cyber Attribution Data Centre (CADC): The Future of Identifying Cyber Threat Actors
    Опубликовано: 1 месяц назад
  • Understanding Your Purpose: Why It Matters & How To Do It Трансляция закончилась 5 лет назад
    Understanding Your Purpose: Why It Matters & How To Do It
    Опубликовано: Трансляция закончилась 5 лет назад
  • Серебро по $71 — это ГЛУБОКИЙ НАРКОЗ, который уничтожит ваш КАПИТАЛ | Уоррен Баффет 11 часов назад
    Серебро по $71 — это ГЛУБОКИЙ НАРКОЗ, который уничтожит ваш КАПИТАЛ | Уоррен Баффет
    Опубликовано: 11 часов назад
  • IE Day 2025 - Advancing LCA by Integrating Socio-Technical Complexity through Agent-Based Modelling 9 дней назад
    IE Day 2025 - Advancing LCA by Integrating Socio-Technical Complexity through Agent-Based Modelling
    Опубликовано: 9 дней назад
  • Александра Прокопенко: настроения российских элит, повышение налогов, инфляция, Козак и Дмитриев 23 часа назад
    Александра Прокопенко: настроения российских элит, повышение налогов, инфляция, Козак и Дмитриев
    Опубликовано: 23 часа назад
  • Getting to Yes: Executive Leadership and Cybersecurity by Dan Doran 3 месяца назад
    Getting to Yes: Executive Leadership and Cybersecurity by Dan Doran
    Опубликовано: 3 месяца назад
  • Emerging Cybersecurity Threats by Igor Opushnyev & Kostiantyn Nikolaiev 1 месяц назад
    Emerging Cybersecurity Threats by Igor Opushnyev & Kostiantyn Nikolaiev
    Опубликовано: 1 месяц назад
  • All Machine Learning algorithms explained in 17 min 1 год назад
    All Machine Learning algorithms explained in 17 min
    Опубликовано: 1 год назад
  • An Overview of Innovation and Cybersecurity Landscapes in Canada by Hyelim Juliana Kim 1 год назад
    An Overview of Innovation and Cybersecurity Landscapes in Canada by Hyelim Juliana Kim
    Опубликовано: 1 год назад
  • CTS Webinar: Preparing Transportation Professionals for AI Integration 7 дней назад
    CTS Webinar: Preparing Transportation Professionals for AI Integration
    Опубликовано: 7 дней назад
  • Технократы на службе войны. Как российская элита стала 1 день назад
    Технократы на службе войны. Как российская элита стала "соучастником"? | "Археология"
    Опубликовано: 1 день назад
  • Webinar. Ocean Accounts in the Indian Ocean Region 3 месяца назад
    Webinar. Ocean Accounts in the Indian Ocean Region
    Опубликовано: 3 месяца назад

Контактный email для правообладателей: [email protected] © 2017 - 2025

Отказ от ответственности - Disclaimer Правообладателям - DMCA Условия использования сайта - TOS



Карта сайта 1 Карта сайта 2 Карта сайта 3 Карта сайта 4 Карта сайта 5