Cybersecurity awareness and education programs: a review of employee engagement and accountability

TO Abrahams, OA Farayola, S Kaggwa… - Computer Science & IT …, 2024 - fepbl.com
As organizations continue to grapple with the escalating threat landscape of cyber-attacks,
the imperative to fortify their cybersecurity defenses becomes increasingly paramount. This …

Theoretical insights into securing remote monitoring systems in water distribution networks: lessons learned from Africa-US projects

FA Adelani, ES Okafor, BS Jacks, OA Ajala - Engineering Science & …, 2024 - fepbl.com
This review paper delves into the critical realm of securing remote monitoring systems within
water distribution networks, illuminating theoretical insights and practical lessons gleaned …

Cybersecurity in banking: a global perspective with a focus on Nigerian practices

AO Hassan, SK Ewuga, AA Abdul… - Computer Science & IT …, 2024 - fepbl.com
The paper review cybersecurity practices in banking, with a specific focus on Nigerian
banks. Cybersecurity has become a paramount concern in the banking industry worldwide …

Synthesizing AI'S impact on cybersecurity in telecommunications: a conceptual framework

PO Shoetan, OO Amoo, ES Okafor… - Computer Science & IT …, 2024 - fepbl.com
As the telecommunications sector increasingly relies on interconnected digital infrastructure,
the proliferation of cyber threats poses significant challenges to security and operational …

A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions

M Ozkan-Ozay, E Akin, Ö Aslan, S Kosunalp… - IEEE …, 2024 - ieeexplore.ieee.org
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …

Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense

SS Nair - Journal of Computer Science and Technology …, 2024 - al-kindipublisher.com
In an era dominated by digital connectivity, the proliferation of advanced cyber threats poses
a formidable challenge to organizations worldwide. This comprehensive guide delves into …

GRACE: Empowering LLM-based software vulnerability detection with graph structure and in-context learning

G Lu, X Ju, X Chen, W Pei, Z Cai - Journal of Systems and Software, 2024 - Elsevier
Software vulnerabilities inflict considerable economic and societal harm. Therefore, timely
and accurate detection of these flaws has become vital. Large language models (LLMs) …

Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness

M Alawida, B Abu Shawar, OI Abiodun, A Mehmood… - Information, 2024 - mdpi.com
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful
generative AI model that can simulate human-like dialogues across a variety of domains …

Deep learning hybridization for improved malware detection in smart Internet of Things

AA Almazroi, N Ayub - Scientific Reports, 2024 - nature.com
The rapid expansion of AI-enabled Internet of Things (IoT) devices presents significant
security challenges, impacting both privacy and organizational resources. The dynamic …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …