Ai-driven cybersecurity: an overview, security intelligence modeling and research directions

IH Sarker, MH Furhad, R Nowrozy - SN Computer Science, 2021 - Springer
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …

A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

Leveraging human factors in cybersecurity: an integrated methodological approach

A Pollini, TC Callari, A Tedeschi, D Ruscio… - Cognition, Technology & …, 2022 - Springer
Abstract Computer and Information Security (CIS) is usually approached adopting a
technology-centric viewpoint, where the human components of sociotechnical systems are …

[HTML][HTML] From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models

TR McIntosh, T Susnjak, T Liu, P Watters, D Xu… - Computers & …, 2024 - Elsevier
This study investigated the integration readiness of four predominant cybersecurity
Governance, Risk and Compliance (GRC) frameworks-NIST CSF 2.0, COBIT 2019, ISO …

Social engineering attacks prevention: A systematic literature review

W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …

Addressing human factors in cybersecurity leadership

WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …

Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview

IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …

[HTML][HTML] Toward human digital twins for cybersecurity simulations on the metaverse: Ontological and network science approach

TN Nguyen - JMIRx Med, 2022 - xmed.jmir.org
Background: Cyber defense is reactive and slow. On average, the time-to-remedy is
hundreds of times larger than the time-to-compromise. In response, Human Digital Twins …

Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

Do leadership styles influence employee information systems security intention? A study of the banking industry

MC Almeida, AC Yoshikuni, R Dwivedi… - Global Journal of Flexible …, 2022 - Springer
The banking industry is highly prone to Information Systems (IS) security breaches from
outside organizations and inside organizations. There are processes to monitor, detect …