A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology

M Sultana, A Hossain, F Laila, KA Taher… - BMC Medical Informatics …, 2020 - Springer
Background Data security has been a critical topic of research and discussion since the
onset of data sharing in e-health systems. Although digitalization of data has increased …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

A low-rank learning-based multi-label security solution for industry 5.0 consumers using machine learning classifiers

A Sharma, S Rani, AK Bashir, M Krichen… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The need for networking in smart industries known as Industry 5.0 has grown critical, and it
is especially important for the security and privacy of the applications. To counter threats to …

Big data security and privacy concerns: a review

A Khanan, S Abdullah, AHHM Mohamed… - Smart Technologies and …, 2019 - Springer
The past few decades have recorded increases in the development of new technologies.
These technologies, such as the smart phone, computers, and social network sensors, have …

An integrated methodology for big data classification and security for improving cloud systems data mobility

I Hababeh, A Gharaibeh, S Nofal, I Khalil - IEEE Access, 2018 - ieeexplore.ieee.org
The expand trend of cloud data mobility led to malicious data threats that necessitate using
data protection techniques. Most cloud system applications contain valuable and …

[PDF][PDF] Analysis of phishing susceptibility in a workplace: a big-five personality perspectives

S Anawar, DL Kunasegaran, MZ Mas'ud… - J Eng Sci …, 2019 - jestec.taylors.edu.my
Employee is frequently referred to as the weakest link in the cyber security in an
organization. Differences in the employees' personality makes it hard for any organization to …

Textual analysis of traitor-based dataset through semi supervised machine learning

F Janjua, A Masood, H Abbas, I Rashid… - Future Generation …, 2021 - Elsevier
Insider threats are one of the most challenging and growing security threats which the
government agencies, organizations, and institutions face. In such scenarios, malicious (red) …

[PDF][PDF] Protecting Data Mobility in Cloud Networks Using Metadata Security.

R Punithavathi, M Kowsigan… - … Systems Science & …, 2022 - cdn.techscience.cn
At present, health care applications, government services, and banking applications use big
data with cloud storage to process and implement data. Data mobility in cloud environments …

An Effective Method to Detect DHCP Starvation Attack using Port Scanning

A Jony, ASM Miah, MN Islam - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Nowadays, the DHCP starvation attack is a crucial attack that denied the services for the
legitimate network user where the attacker mainly occupies all the IP addresses in the …