Next-Generation cyber threat detection and mitigation strategies: a focus on artificial intelligence and machine learning

MR Labu, MF Ahammed - Journal of Computer Science and …, 2024 - al-kindipublisher.com
The principal objective of this research was to examine strategies for detecting and
mitigating cyber threats in the next generation, by underscoring Artificial Intelligence (AI) and …

A survey on Classification of Cyber-attacks on IoT and IIoT devices

Y Shah, S Sengupta - 2020 11th IEEE Annual Ubiquitous …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices have gained popularity in recent years. With the increased
usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT …

Analysis of cyberattacks and its detection mechanisms

KM Sudar, P Deepalakshmi, P Nagaraj… - … on Research in …, 2020 - ieeexplore.ieee.org
With the help of Internet, there are tremendous innovations and developments in
technologies. Most of the business organizations are forced to use the flexible and modern …

Cybersecurity concerns in smart-phones and applications: A survey

MAS Bubukayr, MA Almaiah - 2021 international conference on …, 2021 - ieeexplore.ieee.org
With the greater number of individuals using smartphones and apps increasing gradually,
and with the easily of use. The users may perform more and more sensitive and critical …

[HTML][HTML] COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities

H Saleous, M Ismail, SH AlDaajeh, N Madathil… - Digital communications …, 2023 - Elsevier
Although cyber technologies benefit our society, there are also some related cybersecurity
risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and …

A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

B Biswas, A Mukhopadhyay, S Bhattacharjee… - Decision Support …, 2022 - Elsevier
Online hacker communities are meeting spots for aspiring and seasoned cybercriminals
where they engage in technical discussions, share exploits and relevant hacking tools to be …

Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective

H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …

[图书][B] Cyber threat intelligence: challenges and opportunities

M Conti, T Dargahi, A Dehghantanha - 2018 - Springer
The ever increasing number of cyber attacks requires the cyber security and forensic
specialists to detect, analyze and defend against the cyber threats in almost real-time. In …

[HTML][HTML] A global cyber-threat intelligence system with artificial intelligence and convolutional neural network

F Sufi - Decision Analytics Journal, 2023 - Elsevier
Global cyber-attacks significantly impact the economy, society, organizations, and
individuals. Existing research on cyber-attacks lacks in demonstrating Artificial Intelligence …

[HTML][HTML] Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …