Cybersecurity awareness and education programs: a review of employee engagement and accountability

TO Abrahams, OA Farayola, S Kaggwa… - Computer Science & IT …, 2024 - fepbl.com
As organizations continue to grapple with the escalating threat landscape of cyber-attacks,
the imperative to fortify their cybersecurity defenses becomes increasingly paramount. This …

Fake news detection using recurrent neural network based on bidirectional LSTM and GloVe

L Abualigah, YY Al-Ajlouni, MS Daoud, M Altalhi… - Social Network Analysis …, 2024 - Springer
In the world of technology, the electronic and technical development of the fields of
communication and the internet has increased, which has caused a renaissance in the …

Emerging Technologies for Enhancing Robust Cybersecurity Measures for Business Intelligence in Healthcare 5.0

AR Sakhawat, A Fatima, S Abbas, M Ahmad… - … to Protect Business …, 2024 - igi-global.com
Healthcare 5.0 represents the next phase in healthcare evolution. It aims to harness the
creativity and expertise of healthcare professionals, integrating them with efficient …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

Chatgpt's security risks and benefits: offensive and defensive use-cases, mitigation measures, and future implications

M Charfeddine, HM Kammoun, B Hamdaoui… - IEEE …, 2024 - ieeexplore.ieee.org
ChatGPT has been acknowledged as a powerful tool that can radically boost productivity
across a wide range of industries. It reveals potential in cybersecurity-related tasks such as …

Cyberfusion protocols: Strategic integration of enterprise risk management, ISO 27001, and mobile forensics for advanced digital security in the modern business …

OO Olaniyi, OO Omogoroye… - Journal of …, 2024 - research.sdpublishers.net
This research paper explores the integration of Enterprise Risk Management (ERM), the ISO
27001 standard, and mobile forensics methodologies as a comprehensive framework for …

Distributed Systems and Web-based Inspirations on Cybersecurity and Sustainability: A Review of the Intertwined Challenges and Solutions in Enterprise Systems

T Masoud - Journal of Information Technology and Informatics, 2024 - qabasjournals.com
This study compiles current research on the difficulties of cybersecurity and sustainability in
corporate systems, focusing on important findings and techniques. This study examined the …

[HTML][HTML] Context-aware cyber-threat attribution based on hybrid features

E Irshad, AB Siddiqui - ICT Express, 2024 - Elsevier
With the rapid technological development, identifying the attackers behind cyber-attacks is
getting more sophisticated. To cope with this phenomenon, the current process of cyber …

Cyber Threat Intelligence on Blockchain: A Systematic Literature Review

D Chatziamanetoglou, K Rantos - Computers, 2024 - mdpi.com
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …

Harnessing Machine Learning Techniques for Intelligent Disease Prediction

MI Asghar, F Ahmed, S Khan - International Journal of Computational and …, 2023 - ijcis.com
Anemia, a prevalent medical illness characterized by a deficiency in red blood cells or
hemoglobin, remains a substantial global health issue. The significance of timely …