[HTML][HTML] A literature review of Artificial Intelligence applications in railway systems

R Tang, L De Donato, N Besinović, F Flammini… - … Research Part C …, 2022 - Elsevier
Nowadays it is widely accepted that Artificial Intelligence (AI) is significantly influencing a
large number of domains, including railways. In this paper, we present a systematic literature …

Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb

R Rawat, V Mahor, M Chouhan, K Pachlasiya… - … Conference on Network …, 2022 - Springer
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …

A modified grey wolf optimization algorithm for an intrusion detection system

A Alzaqebah, I Aljarah, O Al-Kadi, R Damaševičius - Mathematics, 2022 - mdpi.com
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …

[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

O Sarker, A Jayatilaka, S Haggag, C Liu… - Journal of Systems and …, 2024 - Elsevier
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …

The anonymity of the dark web: A survey

J Saleem, R Islam, MA Kabir - Ieee Access, 2022 - ieeexplore.ieee.org
The dark web is a section of the Internet that is not accessible to search engines and
requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …

Cybersecurity threats in FinTech: A systematic review

D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2023 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …

Darkweb research: Past, present, and future trends and mapping to sustainable development goals

R Rama, VK Nair, P Nedungadi, I Ray, K Achuthan - Heliyon, 2023 - cell.com
The Darkweb, part of the deep web, can be accessed only through specialized computer
software and used for illegal activities such as cybercrime, drug trafficking, and exploitation …

The Impact of Covid-19 Pandemic on Effective Electronic Criminal Trials: A Comparative Study

OG Andini, MP Kurnia, N Nilasari, GB Andiki - Journal of Human Rights …, 2023 - jhcls.org
The widespread spread of COVID 19 influenced various aspects of life in all nations across
the globe, including the effect on the judicial and penal systems. People were unable to …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

Avoidance of cybersecurity threats with the deployment of a web-based blockchain-enabled cybersecurity awareness system

A Razaque, A Al Ajlan, N Melaoune, M Alotaibi… - Applied Sciences, 2021 - mdpi.com
Modern information technology (IT) is well developed, and almost everyone uses the
features of IT and services within the Internet. However, people are being affected due to …