[PDF][PDF] The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review

M Mijwil, IE Salem, MM Ismaeel - Iraqi Journal For Computer Science and …, 2023 - iasj.net
People in the modern era spend most of their lives in virtual environments that offer a range
of public and private services and social platforms. Therefore, these environments need to …

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT

M Pawlicki, A Pawlicka, R Kozik, M Choraś - Neurocomputing, 2023 - Elsevier
Cloud computing, edge computing, and Internet-of-Things-these new Internet concepts have
already irreversibly changed and influenced people's lives. The security of the three patterns …

[HTML][HTML] Investigating Proactive Digital Forensics Leveraging Adversary Emulation

V Machaka, T Balan - Applied Sciences, 2022 - mdpi.com
Traditional digital forensics techniques are becoming obsolete due to rapid technological
change. Proactive digital forensic investigations (PDFI) solve the challenges of cloud …

Trends in cybersecurity management issues related to human behaviour and machine learning

J Scott, M Kyobe - 2021 International Conference on Electrical …, 2021 - ieeexplore.ieee.org
The number of organisational cybersecurity threats continues to increase every year as
technology advances. All too often, organisations assume that implementing systems …

[PDF][PDF] An Overview Of Social Engineering: The Role of Cognitive Biases Towards Social Engineering-Based Cyber-Attacks, Impacts and Countermeasures.

UG David, A Bode-Asa - network, 2023 - researchgate.net
This paper focuses on the contributions of cognitive biases towards successful social
engineering attacks. To achieve this, a background on social engineering, identification of …

[PDF][PDF] A Survey of E-Commerce Security Threats and Solutions

S Dakov, A Malinova - … of CBU in Natural Sciences and …, 2021 - pdfs.semanticscholar.org
E-commerce security is part of the Web security problems that arise in all business
information systems that operate over the Internet. However, in e-commerce security, the …

Phishing Attack Detection on Text Messages Using Machine Learning Techniques

S Uplenchwar, V Sawant, P Surve… - 2022 IEEE Pune …, 2022 - ieeexplore.ieee.org
Phishing is the exceedingly prevalent type of social engineering attack which attempts to
manipulate or exploit computer users. By performing phishing especially on text messages …

The Power of Persuasion: Exploring Social Engineering in the Digital Age

RK Abdelhamid, M Maqableh - Current and Future Trends on Intelligent …, 2024 - Springer
Social Engineering (SE) encompasses various tactics that exploit human vulnerabilities to
execute security attacks. This paper provides a thorough review and synthesis of recent …

Social engineering cybercrime evidence analysis using formal concept analysis

IB Senkyire, QA Kester - … on Cyber Security and Internet of …, 2021 - ieeexplore.ieee.org
Social engineering which is otherwise known as human piracy, is the art of phishing and
tracing a target to reveal his or her credentials in order to access networks or accounts. It …

[PDF][PDF] A Review of Social Engineering Attacks and their Mitigation Solutions

A Mehta, D Vora, H Sachala, J Khatri… - International Journal of …, 2021 - researchgate.net
The rapid growth in the internet has encouraged mankind to extensively use mobile phones,
computers, and laptops for our convenience. From our day-to-day schedule to our …