Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

[PDF][PDF] Dark web illegal activities crawling and classifying using data mining techniques

AHM Alaidi, M Roa'a, HTS ALRikabi, IA Aljazaery… - iJIM, 2022 - academia.edu
Dark web is a canopy concept that denotes any kind of illicit activities carried out by
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …

[PDF][PDF] Utilising VAPT Technologies (Vulnerability Assessment & Penetration Testing) as a Method for Actively Preventing Cyberattacks

VV Vegesna - International Journal of Management, Technology …, 2023 - researchgate.net
Complexity of systems are increasing day by day. This leads to more and more
vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It …

inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence

P Koloveas, T Chantzios, S Alevizopoulou… - Electronics, 2021 - mdpi.com
In today's world, technology has become deep-rooted and more accessible than ever over a
plethora of different devices and platforms, ranging from company servers and commodity …

Threats from the dark: a review over dark web investigation research for cyber threat intelligence

R Basheer, B Alkhatib - Journal of Computer Networks and …, 2021 - Wiley Online Library
From proactive detection of cyberattacks to the identification of key actors, analyzing
contents of the Dark Web plays a significant role in deterring cybercrimes and understanding …

Iovt: Internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids

P Anand, Y Singh, A Selwal, PK Singh, RA Felseghi… - Energies, 2020 - mdpi.com
In recent years, people have witnessed numerous Internet of Things (IoT)-based attacks with
the exponential increase in the number of IoT devices. Alongside this, the means to secure …

[HTML][HTML] Weaponization of the growing cybercrimes inside the dark net: The question of detection and application

A Adel, M Norouzifard - Big Data and Cognitive Computing, 2024 - mdpi.com
The Dark Web is a subset of the Deep Web, requiring special browsers, the Dark Net refers
to encrypted networks, the Deep Web encompasses non-indexed online content, and …

Exploring dark web crawlers: a systematic literature review of dark web crawlers and their implementation

J Bergman, OB Popov - IEEE Access, 2023 - ieeexplore.ieee.org
Strong encryption algorithms and reliable anonymity routing have made cybercrime
investigation more challenging. Hence, one option for law enforcement agencies (LEAs) is …

Blockchain-based cyber threat intelligence system architecture for sustainable computing

J Cha, SK Singh, Y Pan, JH Park - Sustainability, 2020 - mdpi.com
Nowadays, the designing of cyber-physical systems has a significant role and plays a
substantial part in developing a sustainable computing ecosystem for secure and scalable …