Android mobile malware detection using fuzzy AHP

JM Arif, MF Ab Razak, SRT Mat, S Awang… - Journal of Information …, 2021 - Elsevier
Android mobile is very challenging because it is an open-source operating system that is
also vulnerable to attacks. Previous studies have shown various mobile malware detection …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …

Consumers' change in trust and security after a personal data breach in online shopping

A Strzelecki, M Rizun - Sustainability, 2022 - mdpi.com
This research is dedicated to one of the significant problems connected with purchasing
online: consumers' personal data security. The purpose of the paper is to present the results …

Authentication Methods Selection in Information Security through Hybrid AHP and EGT

BW Loo, PL Tan, SK Tey… - Journal of Advanced …, 2025 - semarakilmu.com.my
The information security leader frequently encounters the challenge of choosing the
appropriate defence strategy. Effective multi-criteria decision-making (MCDM) is essential in …

Development of Cybersecurity Footprint Index for Manufacturing Companies to Assess Organizational Cyber Posture

JA Del Vecchio - 2024 - search.proquest.com
With the continued changes in how businesses work, cyber-attack targets are constantly in
flux between organizations, individuals, and various aspects of the supply chain of …

Proposta de modelo de mensuração de apetite a riscos cibernéticos: uso do método AHP e da estrutura básica de segurança cibernética

MAC Georg - 2024 - realp.unb.br
Realizar escolhas em relação aos desafios que o mundo cibernético tem apresentado tem
sido uma das tarefas mais árduas dos gestores, sejam do setor privado como do setor …

A Study of Cyber Attack Behavior based on Algebraic Topology

X Zhang, H Yan, Z Liu - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
It is inevitable that serious damage will occur once the hosts suffer from cyberattack.
Therefore, the study of cyberattacks has become indispensable in the field of cyber security …