ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah

Автор: Canadian Institute for Cybersecurity (CIC)

Загружено: 2024-05-27

Просмотров: 3753

Описание: Recorded as part of the May 10 Cybersecurity Revolution (SECREV) event for #cybersecurity research with introduction by Sumit Kundu, Strategic Collaborations & Partnership Development Officer

Securing these interconnected environments has become paramount in the era of ubiquitous #InternetOfThings (IoT) devices. This talk concentrates on the complexities and challenges of #IoTSecurity, underscored by the exponential growth of devices and their diverse applications across sectors such as smart homes, healthcare, and transportation. We illuminate the cutting-edge methodologies employed in IoT device profiling, fingerprinting, and behavioural analysis through a detailed examination of four recently published #datasets. These datasets offer a foundation for understanding device behaviours under various scenarios, including attack simulations, and enhance our ability to conduct vulnerability assessments and develop robust security frameworks. This presentation aims to equip researchers, developers, and cybersecurity professionals with the knowledge and tools needed to strengthen IoT ecosystems against emerging threats by exploring the convergence of machine-learning approaches, real-time data analysis, and comprehensive attack documentation.

Dr. Sajjad Dadkhah is an accomplished Assistant Professor, cybersecurity R&D team leader, and faculty member at the Canadian Institute of Cybersecurity, University of New Brunswick. With a career spanning over 10 years, Dadkhah has made significant contributions in the fields of digital multimedia security, computer security, and machine learning-based detection systems. Throughout his career, Dadkhah has held roles in various prestigious organizations, including Kyushu University (Japan), Universiti Malaya, IRIS Smart Technology Complex, and Kyushu Institute of Technology (Japan). His expertise as a team leader, researcher, and security consultant has been instrumental in the success of numerous security projects.

In recognition of his research capabilities, Dadkhah was awarded a fellowship by the Kyushu Institute of Technology in 2016, allowing him to continue his research for 2 years. As a testament to his dedication and expertise, he has served as the Managing Editor and Board member of Applied Soft Computing, a renowned Elsevier journal, since 2016. As a research coordinator and team lead at CIC, Dadkhah has spearheaded several academic and industrial cybersecurity research projects. His research endeavours have encompassed various areas, including IoT device profiling in smart transportation pathways, security of data provenance and machine learning for IoT, and the development of Deep Defender-AI-driven hostile detection applications.

Dadkhah led the CIC-Deep Defender AI project, focused on detecting fake news through advanced artificial intelligence algorithms. Additionally, he played a role in the creation of 3 cybersecurity datasets, furthering the advancement of the field. Notably, he led 2 NRC-CIC projects, specializing in IoT profiling and intrusion detection systems in vehicle networks, as well as the development of an IoT network traffic analyzer pipeline.

Dadkhah's contributions extend beyond academia, as he led the TruthSeeker project, the largest social media ground-truth real/fake project to date. Furthermore, he pioneered a multimodal framework for early fake news detection, showcasing his commitment to combating misinformation in the digital age. Over the past 2 years, Dadkhah's research has focused on security in AI-driven algorithms, security in the IoT domain, multimedia security and forensics, and the development of IDS and malware detection algorithms. With an unwavering passion for advancing cybersecurity and protecting digital systems, Dadkhah has established himself as a leading authority in the field of cybersecurity and security in IoT. Through his research contributions, leadership, and dedication, he continues to drive innovation and shape the future of cybersecurity.

Cybersecurity Revolution (SECREV), https://www.serene-risc.ca/secrev.org...
Other SECREV recordings,    / @hc2p  
https://www.unb.ca/cic/datasets/iotda...
https://www.unb.ca/cic/datasets/iotda...
https://www.unb.ca/cic/datasets/iomt-...
https://www.unb.ca/cic/datasets/iov-d...
https://www.unb.ca/cic/datasets/evse-...

#TechTalk

  / cic_unb  
https://fb.me/cicunbca
  / canadian_institute_cybersecurity  
https://www.unb.ca/cic/

0:00 Intro
1:32 Opening
2:14 What is IoT
3:27 IoT Statistics
4:30 CIC IoT Group
7:00 IoT Profiling vs Networking Monitoring
9:36 Challenges
15:39 Security in AI IoT
18:38 Large-scale Attack in IoT Environment
23:14 IoT in Healthcare
23:50 CIC IoT Profiling Dataset 2022
24:24 CIC IoT Attack Dataset 2023
24:36 CIC IoMT Healthcare 2024
25:27 CIC IoV Attack 2024
25:54 CIC IoV EV Charger 2024
26:09 Closing
26:23 Q&A

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
From Profiling to Protection: Leveraging Datasets for Enhanced IoT Security by Dr. Sajjad Dadkhah

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

IoTProMo: Securing IoT Networks using Device Profiling and Monitoring by Alireza Zohourian

IoTProMo: Securing IoT Networks using Device Profiling and Monitoring by Alireza Zohourian

🎙️ Честное слово с Игорем Липсицем

🎙️ Честное слово с Игорем Липсицем

Enhancing Generalizability in DDoS Attack Detection Systems through Transfer Learning and ...

Enhancing Generalizability in DDoS Attack Detection Systems through Transfer Learning and ...

Понимание GD&T

Понимание GD&T

Cybersecurity Outreach and Awareness at CIC and Beyond by Griffin Higgins

Cybersecurity Outreach and Awareness at CIC and Beyond by Griffin Higgins

Securing Substations with Trust, Risk Posture, and Multi-Agent Systems by Dr. K. Boakye-Boateng

Securing Substations with Trust, Risk Posture, and Multi-Agent Systems by Dr. K. Boakye-Boateng

Что происходит с нейросетью во время обучения?

Что происходит с нейросетью во время обучения?

A Dual-Function Dataset for IoT Device Identification and Anomaly Detection by Dr. Mahdi Rabbani

A Dual-Function Dataset for IoT Device Identification and Anomaly Detection by Dr. Mahdi Rabbani

Лучший документальный фильм про создание ИИ

Лучший документальный фильм про создание ИИ

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

What are AI Agents?

What are AI Agents?

Divine Music - The Year Mix Vol.10 [Chill & Ethnic Deep 2025]

Divine Music - The Year Mix Vol.10 [Chill & Ethnic Deep 2025]

Deep Learning for intrusion detection in emerging technologies with Dr. Euclides Neto

Deep Learning for intrusion detection in emerging technologies with Dr. Euclides Neto

Почему работает теория шести рукопожатий? [Veritasium]

Почему работает теория шести рукопожатий? [Veritasium]

21 неожиданный способ использовать Gemini в повседневной жизни

21 неожиданный способ использовать Gemini в повседневной жизни

The Next Cyber Era by Rajiv Gupta

The Next Cyber Era by Rajiv Gupta

Low-Latency Security for Time-Critical Grid Communication with Shabnam Saderi, Research Assistant

Low-Latency Security for Time-Critical Grid Communication with Shabnam Saderi, Research Assistant

Экспресс-курс RAG для начинающих

Экспресс-курс RAG для начинающих

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Weaponizing Intelligence: Understanding LLM-Driven Malware and Zero-Day Threats by Samita Bai

Weaponizing Intelligence: Understanding LLM-Driven Malware and Zero-Day Threats by Samita Bai

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]