ATM Malware Threat Vulnerability and Infection

A Kapoor - Available at SSRN 4430813, 2023 - papers.ssrn.com
Cybercriminals, in their ceaseless attempt to rake in profits, have found another way to target
ATMs: via the bank's network. It is worth noting that the first entry into the network is usually …

Newsvendor Problem and Forecasting based on Past Data

A Kapoor - Available at SSRN 4430823, 2023 - papers.ssrn.com
Abstract In operational analytics, Newsvendor Problem is an essential model used to define
the problem of finding optimal solution for many industries. Forecasting methods are used to …

Traffic Systems Vulnerabilities and Cyber-Attacks

A Kapoor - Available at SSRN 4430819, 2023 - papers.ssrn.com
Given the widespread, ongoing threat against the transport industry, the researchers has
developed a toolkit. If we dig into the directives for rail, public transportation and surface …

Load Balancing of Nodes in Cloud Using Ant Colony Optimization

A Kapoor - Available at SSRN 4430821, 2023 - papers.ssrn.com
In this paper, we proposed an algorithm for load distribution of workloads among nodes of a
cloud by the use of Ant Colony Optimization (ACO). This is a modified approach of ant …

Blockchain-And Secure Architecture from Cyber Threat

A Kapoor - Available at SSRN 4267946, 2022 - papers.ssrn.com
In the digital world, blockchain technology is a relatively new concept. It is among the newest
technologies of the contemporary day. The foundation for bitcoins and other …

Quantum Cryptography Analysis For Threat Assessment

A Kapoor - Available at SSRN 4284366, 2022 - papers.ssrn.com
Today, the importance of information security makes the subject of cryptography a huge
topic of discussion. Math-based encryption has dominated the area of information security …

An Review-Smartphone and Tablet Cyberattack Threat Detection

A Kapoor - Available at SSRN 4430809, 2023 - papers.ssrn.com
It's hard to list all of the various ways or reasons cybercriminals may attack a cell phone and
its infrastructure. It could come in the form of intercepting communication to gain access to …

Systematic Literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkweb

S Telang, B Garg - Proceedings of International Conference on …, 2022 - books.google.com
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …

Cyber Threat vulnerability for Business Intelligence in Big Data

A Kapoor - Available at SSRN 4284374, 2022 - papers.ssrn.com
In today's digital era, the world is revolving around technologically coveted ideas and
techniques which can be transformed into business logics in corporate world. The entire …

Threat and vulnearbilty for Social Media Marketing

A Kapoor - Available at SSRN 4267948, 2022 - papers.ssrn.com
Like the oxygen we breathe, social media has become all-pervasive. People use Facebook,
Instagram, Twitter, and a variety of other platforms to connect with people across the world …