[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Cybersecurity of industrial cyber-physical systems: A review

H Kayan, M Nunes, O Rana, P Burnap… - ACM Computing Surveys …, 2022 - dl.acm.org
Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the
processes based on the “physics” data gathered by edge sensor networks. Recent …

[HTML][HTML] Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures

G González-Granadillo, S González-Zarzosa, R Diaz - Sensors, 2021 - mdpi.com
Security Information and Event Management (SIEM) systems have been widely deployed as
a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

[HTML][HTML] Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

[HTML][HTML] A hybrid MCDM model combining DANP and PROMETHEE II methods for the assessment of cybersecurity in industry 4.0

W Torbacki - Sustainability, 2021 - mdpi.com
IT technologies related to Industry 4.0 facilitate the implementation of the framework for
sustainable manufacturing. At the same time, Industry 4.0 integrates IT processes and …

[HTML][HTML] Recommender systems in cybersecurity

L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …

[HTML][HTML] Cybersecurity model based on hardening for secure internet of things implementation

A Echeverría, C Cevallos, I Ortiz-Garces, RO Andrade - Applied Sciences, 2021 - mdpi.com
The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids,
and other smart concepts has driven data-driven decision making by managers and …

Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface

SG Magomedov, PV Kolyasnikov… - Russian Technological …, 2020 - rtj-mirea.ru
The paper addresses the development of technology for controlling access to digital portals
and platforms based on assessments of personal characteristics of user behavior built into …