A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

Exploring the impact of AI-based cyber security financial sector management

S Mishra - Applied Sciences, 2023 - mdpi.com
Cyber threats are attempts to secure unauthorized access to, change, or delete private
information, to demand money from victims, or to disrupt business. Cybercrime includes …

Distributed blockchain-SDN secure IoT system based on ANN to mitigate DDoS attacks

R Jmal, W Ghabri, R Guesmi, BM Alshammari… - Applied Sciences, 2023 - mdpi.com
By bringing smart and advanced solutions, the Internet of Things (IoT) has opened up new
dimensions of innovative services and processing power for contemporary living standards …

Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy

S Mishra - Electronics, 2023 - mdpi.com
The cyberspace is a convenient platform for creative, intellectual, and accessible works that
provide a medium for expression and communication. Malware, phishing, ransomware, and …

Using Supervised Learning to Detect Command and Control Attacks in IoT

M AlShaikh, W Alsemaih, S Alamri… - International Journal of …, 2024 - igi-global.com
The rapid proliferation of internet of things (IoT) devices has ushered in a new era of
technological development. However, this growth has also exposed these devices to various …

[PDF][PDF] Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices.

SE Jeon, YS Oh, YJ Lee, IG Lee - CMES-Computer Modeling in …, 2024 - cdn.techscience.cn
With the advancement of wireless network technology, vast amounts of traffic have been
generated, and malicious traffic attacks that threaten the network environment are becoming …

Determining Web Application Vulnerabilities Using Machine Learning Methods

A Zhumabekova, ET Matson, V Karyukin… - … School-Seminar on …, 2023 - ieeexplore.ieee.org
Information technology is a significant factor in the modern world. This area is developing
quickly, becoming essential as new, more complex protection methods appear. Threat …

IoT Security, Future Challenges, and Open Issues

N Tariq, T Saboor, M Ashraf, R Butt… - … Measures for Logistics …, 2024 - igi-global.com
The internet of things (IoT) refers to the network of connected devices embedded in
everyday objects that enable digital transformation. The rapid proliferation of IoT devices has …

Application Study on the Reinforcement Learning Strategies in the Network Awareness Risk Perception and Prevention

J Xie - International Journal of Computational Intelligence …, 2024 - Springer
The intricacy of wireless network ecosystems and Internet of Things (IoT) connected devices
have increased rapidly as technology advances and cyber threats increase. The existing …

Design Secure Cloud Based IoT Network for End to End Cloud Communication

AD Wankhade, K Wagh - … on Emerging Trends in Engineering & …, 2023 - ieeexplore.ieee.org
Devices in IoT are resource constrained devices. This is the basic reason that makes IoT
network prone to vulnerabilities. When compared with previous different types of networks …