Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies

S Hakak, WZ Khan, M Imran, KKR Choo… - Ieee …, 2020 - ieeexplore.ieee.org
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-
19 pandemic is no exception. For example, social distancing measures have resulted in …

Heuristic phishing detection and URL checking methodology based on scraping and web crawling

R Almeida, C Westphall - 2020 IEEE International Conference …, 2020 - ieeexplore.ieee.org
With the improvement of techniques used by the attackers, the detection and prevention of
threats such as phishing and malware can represent a problem and computational …

Intelligent Game-Theoretic Approach for Resilient Robust Control Design of Cyber-Physical Systems: Application to Intelligent Transportation Systems

R Yu, X Zhao, S Lu, YH Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In order to improve the control performance of the Cyber-Physical Systems (CPSs), an
integrated modelling-control-design trio framework is established in this paper. In the …

Active and passive security attacks in wireless networks and prevention techniques

SJ Ee, JWT Ming, JS Yap, SCY Lee, F tuz Zahra - Authorea Preprints, 2023 - authorea.com
In this modern day and age, wireless networks are everywhere. It is not a far stretch to say
that it is downright crucial due to its ability to keep people connected and updated …

[PDF][PDF] Enhancing Cyber Security Resilience: Phishing Defense and the Importance of Measurement Strategies

F Sharif - 2024 - researchgate.net
In an era marked by increasing digital transformation, phishing attacks have emerged as a
pervasive threat, exploiting human vulnerabilities and technological weaknesses. These …

[PDF][PDF] Phishing Defense Mechanisms: Strategies for Effective Measurement and Cyber Threat Mitigation

J Hera - 2024 - researchgate.net
Phishing attacks continue to represent one of the most prevalent and damaging
cybersecurity threats facing organizations today. These deceptive tactics exploit human …

The Trends of Cybersecurity and Its Emerging Challenges in Africa

SF Cinini, SO Ehiane, FJ Osaye… - … and Challenges in South …, 2023 - Springer
The cost of cybersecurity is steadily increasing, both in terms of the overall loss to the
organisation and in terms of the number of cyberattacks. Every day, new cyber threat types …

Cibersegurança: o papel da polícia de segurança pública na prevenção do cibercrime

SMT Pereira - 2022 - comum.rcaap.pt
O ciberespaço, com as suas particularidades e podendo ser acedido por qualquer pessoa,
necessita de ser um local seguro para se tirar o melhor partido das potencialidades que tem …

[PDF][PDF] AI-Enhanced Defense Metrics: Leveraging Bio-Inspired Algorithms for Advanced Threat Detection and Classification

A Khali - 2021 - researchgate.net
In the contemporary landscape of cybersecurity, the sophistication of threats has
necessitated the development of innovative defense strategies that leverage advanced …

Comparative Analysis of Various Ensemble Algorithms for Computer Malware Prediction

YB Wicaksono, C Juliane - Jurnal RESTI (Rekayasa Sistem dan …, 2023 - jurnal.iaii.or.id
By 2022 it is estimated that 29 billion devices have been connected to the internet so that
cybercrime will become a major threat. One of the most common forms of cybercrime is …