An investigation on cyber espionage ecosystem

M Ahmed, M Gaber - Journal of Cyber Security Technology, 2024 - Taylor & Francis
Traditional cyber security countermeasures are focused on addressing the threats to critical
infrastructure using penetration testing exercises. The classical cyber wargaming, ie Red …

Systematic literature review on security misconfigurations in web applications

SL Martins, FM Cruz, RP Araújo… - International Journal of …, 2024 - Taylor & Francis
Security misconfigurations are unintentional errors that can lead to vulnerabilities in
applications, compromising an organization's safety. This article aims to provide a …

Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard

M Pathak, KN Mishra, SP Singh - Artificial Intelligence Review, 2024 - Springer
Abstract The Internet of Things (IoT) is a powerful technology adopted in various industries.
Applications of the IoT aim to enhance automation, productivity, and user comfort in a cloud …

Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers

M Dart, M Ahmed - Journal of Cyber Security Technology, 2023 - Taylor & Francis
This paper introduces a novel cyber incident cost estimation methodology, applicable to
large Australian healthcare providers. A review demonstrates the poor utility of current risk …

Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring

JA Gómez-Hernández, P García-Teodoro - Sensors, 2024 - mdpi.com
Given the high relevance and impact of ransomware in companies, organizations, and
individuals around the world, coupled with the widespread adoption of mobile and IoT …

How does cybersecurity awareness help in achieving digital financial inclusion in rural India under escalating cyber fraud scenario?

M Afzal, M Meraj, M Kaur… - Journal of Cyber Security …, 2024 - Taylor & Francis
The remarkable rise of cybercrime and its catastrophic consequences pose a significant
threat to global financial and banking institutions. Financial inclusion is essential in fostering …

A comprehensive examination of security and privacy in precision agriculture technologies

PA Ongadi - GSC Advanced Research and Reviews, 2024 - gsconlinepress.com
Precision agriculture has revolutionized modern farming practices by integrating cutting-
edge technologies such as sensors, drones, and data analytics to optimize crop …

Securing the Future: Proactive Threat Hunting for Sustainable IoT Ecosystems

S Ghasemshirazi, G Shirvani - arXiv preprint arXiv:2406.14804, 2024 - arxiv.org
In the rapidly evolving landscape of the IoT, the security of connected devices has become a
paramount concern. This paper explores the concept of proactive threat hunting as a pivotal …

Toward a Search-Based Approach to Support the Design of Security Tests for Malicious Network Traffic

D La Gamba, G Iuliano, G Recupito… - Proceedings of the 28th …, 2024 - dl.acm.org
IoT devices generate and exchange large amounts of data daily, creating significant security
and privacy challenges. Security testing, particularly using Machine Learning (ML), helps …

Investigating Threats Posed by SMS Origin Spoofing to IoT Devices

A Tsunoda - Digital Threats: Research and Practice, 2023 - dl.acm.org
The short message service (SMS) is a service for exchanging texts via mobile networks that
has been developed not only as a means of text communication between subscribers but …