Advancements in Detection and Mitigation: Fortifying Against APTs-A Comprehensive Review

A Kumar, M Fahad, H Arif… - … Jurnal Multidisiplin Ilmu, 2024 - journal.mediapublikasi.id
Organizations' cyber security posture is severely challenged by Advanced Persistent Threats
(APTs), necessitating a multifaceted defense strategy. Traditional methods, machine …

Emerging Trends in Cybersecurity for Critical Infrastructure Protection: A Comprehensive Review

SA Daniel, SS Victor - Computer Science & IT Research Journal, 2024 - fepbl.com
As critical infrastructure becomes increasingly interconnected and digitized, the need for
robust cybersecurity measures to safeguard essential systems is more pressing than ever …

Usability Evaluation and Workload Assessment of a Cybersecurity Educational Game Application

S Criollo-C, A Guerrero-Arias… - IEEE …, 2024 - ieeexplore.ieee.org
Currently, social networks and Internet access have become a place that fosters risky
experiences for their users, who are vulnerable and can become victims of violence, online …

ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security

K Mukherjee, J Wiedemeier, Q Wang… - … Conference on Applied …, 2024 - Springer
Abstract Internet of Things (IoT) devices have increased drastically in complexity and
prevalence within the last decade. Alongside the proliferation of IoT devices and …

Security and Privacy Issues in Distributed Healthcare Systems-A Survey

M Bhardwaj¹, S Noeiaghdam… - Meta-Heuristic Algorithms …, 2024 - books.google.com
It is clear that businesses want to reduce their reliance on a centralized data center without
sacrificing the efficiency of their regionally dispersed database, application, and user …

[PDF][PDF] Usability and Workload Evaluation of a Cybersecurity Educational Game Application: A Case Study

D BUENAÑO-FERNÁNDEZ, S LUJÁN-MORA - 2024 - researchgate.net
Currently, social networks and Internet access have become a place that fosters risky
experiences for their users, who are vulnerable and can become victims of violence, online …

Método de Referencia para Identificar Vulnerabilidades en Aplicaciones Android en PYMES utilizando Herramientas Automatizadas de Código Abierto

CE Miranda Quezada, F Vasquez Vasquez… - repositorioacademico.upc.edu.pe
Las PYMES, en su rápido avance hacia la digitalización, han adoptado en gran medida las
aplicaciones móviles para mejorar su competitividad y servicio. Sin embargo, esta adopción …