Design of capability maturity model integration with cybersecurity risk severity complex prediction using bayesian-based machine learning models

FH Alshammari - Service Oriented Computing and Applications, 2023 - Springer
Extreme complex events and the corresponding abnormal statistics of cyber security are
ubiquitously observed in many real-time systems, and the development of efficient tools to …

Design development and evaluation of the cybersecurity risk tool: a case of small and medium-sized enterprises in South Africa

T Ncubukezi - 2023 - etd.cput.ac.za
The increased convenient use and the openness of cyberspace increased cyberrisks in all
institutions. The cybercriminals use innovative ways to gain unauthorised access to systems …

Vulnerability detection towards protecting intrusion by Social Network Analysis approach

AA Rasheed - 2021 5th International Conference on Trends in …, 2021 - ieeexplore.ieee.org
Network intrusion is emerging as an active area of research in recent times. The researchers
from the academia and industry are spending their efforts by proposing methodologies that …

Identity Theft Prediction Model using Historical Data and Supervised Machine Learning: Design Science Research Study

C Mitchell - 2023 - search.proquest.com
With the growth of online banking, there has been a rise in identity theft and other
cybercrimes. What is missing in the current published literature is how historical identity theft …