A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Business email compromise phishing detection based on machine learning: A systematic literature review

HF Atlam, O Oluwatimilehin - Electronics, 2022 - mdpi.com
The risk of cyberattacks against businesses has risen considerably, with Business Email
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …

Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches

A Mughaid, S AlZu'bi, A Alnajjar, E AbuElsoud… - Multimedia Tools and …, 2023 - Springer
Abstract Non Orthogonal Multiple Access (NOMA) successfully drew attention to the
deployment of 5th Generation (5G) wireless communication systems, and it is now …

Exploring the capabilities and limitations of chatgpt and alternative big language models

S AlZu'bi, A Mughaid, F Quiam… - Artificial Intelligence …, 2024 - ojs.bonviewpress.com
ChatGPT, an artificial intelligence (AI)-powered chatbot developed by OpenAI, has gained
immense popularity since its public launch in November 2022. With its ability to write essays …

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges

M Bhattacharya, S Roy, S Chattopadhyay… - Security and …, 2023 - Wiley Online Library
Over the past few years, online social networks (OSNs) have become an inseparable part of
people's daily lives. Instead of being passive readers, people are now enjoying their role as …

Diabetes monitoring system in smart health cities based on big data intelligence

S AlZu'bi, M Elbes, A Mughaid, N Bdair, L Abualigah… - Future Internet, 2023 - mdpi.com
Diabetes is a metabolic disorder in which the body is unable to properly regulate blood
sugar levels. It can occur when the body does not produce enough insulin or when cells …

A Machine Learning Approach for Phishing Attack Detection

T Choudhary, S Mhapankar, R Bhddha… - Journal of Artificial …, 2023 - ojs.istp-press.com
Phishing is the easiest method for gathering sensitive information from unwary people.
Phishers seek to get private data including passwords, login information, and bank account …

A Systematic Review on Deep-Learning-Based Phishing Email Detection

K Thakur, ML Ali, MA Obaidat, A Kamruzzaman - Electronics, 2023 - mdpi.com
Phishing attacks are a growing concern for individuals and organizations alike, with the
potential to cause significant financial and reputational damage. Traditional methods for …

A Boosting based Hybrid Feature Selection and Multi-layer Stacked Ensemble Learning Model to detect phishing websites

LR Kalabarige, RS Rao, AR Pais, LA Gabralla - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing is a type of online scam where the attacker tries to trick you into giving away your
personal information, such as passwords or credit card details, by posing as a trustworthy …

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …