|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Faeiz Alserhani and Alaa Aljared
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to...
ver más
|
|
|
|
|
|
|
Mauricio Diéguez, Carlos Cares, Cristina Cachero and Jorge Hochstetter
As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out co...
ver más
|
|
|
|
|
|
|
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and...
ver más
|
|
|
|
|
|
|
Marco Vernier, Manuela Farinosi, Alberto Foresti and Gian Luca Foresti
In recent years, social platforms have become integrated in a variety of economic, political and cultural domains. Social media have become the primary outlets for many citizens to consume news and information, and, at the same time, to produce and share...
ver más
|
|
|
|
|
|
|
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate...
ver más
|
|
|
|
|
|
|
Fahim Sufi
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe...
ver más
|
|
|
|
|
|
|
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu
Software developers represent the bastion of application security against the overwhelming cyber-attacks which target all organizations and affect their resilience. As security weaknesses which may be introduced during the process of code writing are com...
ver más
|
|
|
|