Cyber security threats and vulnerabilities: a systematic mapping study

M Humayun, M Niazi, NZ Jhanjhi, M Alshayeb… - Arabian Journal for …, 2020 - Springer
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …

Mobile security: Threats and best practices

P Weichbroth, Ł Łysik - Mobile Information Systems, 2020 - Wiley Online Library
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …

[PDF][PDF] Exploring the top five evolving threats in cybersecurity: an in-depth overview

M Mijwil, OJ Unogwu, Y Filali, I Bala… - Mesopotamian journal of …, 2023 - iasj.net
The term cybersecurity refers to an environment capable of protecting digital devices,
networks and information from unauthorized access and preventing data theft or alteration. It …

Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure

A Djenna, S Harous, DE Saidouni - Applied Sciences, 2021 - mdpi.com
As a new area of technology, the Internet of Things (IoT) is a flagship and promising
paradigm for innovating society. However, IoT-based critical infrastructures are an appealing …

[PDF][PDF] Cyber-security incidents: a review cases in cyber-physical systems

MN Al-Mhiqani, R Ahmad, W Yassin… - … Journal of Advanced …, 2018 - researchgate.net
Cyber-Physical Systems refer to systems that have an interaction between computers,
communication channels and physical devices to solve a real-world problem. Towards …

Cyber attacks in the era of covid-19 and possible solution domains

IC Eian, LK Yong, MYX Li, YH Qi, Z Fatima - 2020 - preprints.org
In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially.
The number of people doing online activities such as e-learning, remote working, online …

Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks

M Abomhara, GM Køien - Journal of Cyber Security …, 2015 - journals.riverpublishers.com
Abstract Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services
are becoming pervasive. Their success has not gone unnoticed and the number of threats …

Methodological framework to collect, process, analyze and visualize cyber threat intelligence data

LJ Borges Amaro, BW Percilio Azevedo… - Applied Sciences, 2022 - mdpi.com
Cyber attacks have increased in frequency in recent years, affecting small, medium and
large companies, creating an urgent need for tools capable of helping the mitigation of such …

Assessment of cybersecurity awareness among students of Majmaah University

T Alharbi, A Tassaddiq - Big Data and Cognitive Computing, 2021 - mdpi.com
Information exchange has become increasingly faster and efficient through the use of recent
technological advances, such as instant messaging and social media platforms …

Cyber risk prediction through social media big data analytics and statistical machine learning

A Subroto, A Apriyana - Journal of Big Data, 2019 - Springer
As a natural outcome of achieving equilibrium, digital economic progress will most likely be
subject to increased cyber risks. Therefore, the purpose of this study is to present an …