A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

A comprehensive systematic literature review on intrusion detection systems

M Ozkan-Okay, R Samet, Ö Aslan, D Gupta - IEEE Access, 2021 - ieeexplore.ieee.org
Effectively detecting intrusions in the computer networks still remains problematic. This is
because cyber attackers are changing packet contents to disguise the intrusion detection …

Hierarchical federated learning based anomaly detection using digital twins for smart healthcare

D Gupta, O Kayode, S Bhatt, M Gupta… - 2021 IEEE 7th …, 2021 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) is becoming ubiquitous with a proliferation of smart
medical devices and applications used in smart hospitals, smart-home based care, and …

Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses

AA Elkhail, RUD Refat, R Habre, A Hafeez… - IEEE …, 2021 - ieeexplore.ieee.org
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …

GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment

M Arunkumar, KA Kumar - International Journal of Information Technology, 2023 - Springer
Cloud computing is the most useful computing technology for the new service progression.
Due to the distributed nature of cloud computing, security threats and cyber attacks are …

Android malware detection as a bi-level problem

M Jerbi, ZC Dagdia, S Bechikh, LB Said - Computers & Security, 2022 - Elsevier
Malware detection is still a very challenging topic in the cybersecurity field. This is mainly
due to the use of obfuscation techniques. To solve this issue, researchers proposed to …

A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism.

J Ferdous, R Islam, A Mahboubi, MZ Islam - IEEE Access, 2023 - ieeexplore.ieee.org
The increasing sophistication of malware threats has led to growing concerns in the anti-
malware community, as malware poses a significant danger to online users despite the …

Detecting anomalous user behavior in remote patient monitoring

D Gupta, M Gupta, S Bhatt… - 2021 IEEE 22nd …, 2021 - ieeexplore.ieee.org
The growth in Remote Patient Monitoring (RPM) services using wearable and non-wearable
Internet of Medical Things (IoMT) promises to improve the quality of diagnosis and facilitate …

Development of a scale to measure cybercrime-awareness on social media

I Arpaci, O Aslan - Journal of Computer Information Systems, 2023 - Taylor & Francis
This study developed a psychometric scale to measure users' cybercrime awareness level
on social media. Psychometric properties of the C ybercrime A wareness on S ocial M edia S …

Addressing Behavioral Drift in Ransomware Early Detection Through Weighted Generative Adversarial Networks

U Urooj, BAS Al-Rimy, A binti Zainal, F Saeed… - IEEE …, 2023 - ieeexplore.ieee.org
Crypto-ransomware attacks pose a significant cyber threat due to the irreversible effect of
encryption employed to deny access to the data on the victim's device. Existing state-of-the …