[HTML][HTML] Automatic decision tree-based nidps ruleset generation for dos/ddos attacks

A Coscia, V Dentamaro, S Galantucci, A Maci… - Journal of Information …, 2024 - Elsevier
As the occurrence of Denial of Service and Distributed Denial of Service (DoS/DDoS)
attacks increases, the demand for effective defense mechanisms increases. Recognition of …

Privacy and security of healthcare data in cloud based on the blockchain technology

A Agarwal, R Joshi, H Arora… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Blockchain is basically a conveyed database that contains records and public record for all
exchanges or computerized occasions that have been performed and shared among …

Emerging Cybersecurity Attacks in the Era of Digital Transformation

S Mishra, S Gochhait - 2023 7th International Conference on …, 2023 - ieeexplore.ieee.org
The rapid digital transformation across industries, including manufacturing, has created
significant blind spots for organizations when it comes to security. The threat surface grows …

Personal Privacy and Cyber Security: Student Attitudes, Awareness, and Perception on the Use of Social Media: Student Attitudes, Awareness, and Perception on the …

JN Sales, R Tiongco, S Lu, MJ Ruiz, J Cruz… - International Journal of …, 2024 - ijci.globets.org
Students now a days are described as the generation that cannot live without using social
media. It is patent that using social media platforms are already part of our daily activities to …

Machine Learning and Speech Analysis Framework for Protecting Children against Harmful Online Content

A Dhoka, S Pachauri, C Nigam… - … on Electronics and …, 2023 - ieeexplore.ieee.org
Nowadays, it becomes significant to protect children from the detrimental influences of
offensive online things like hateful messages, violence content, bullying and pornography …

Cyber Security Evolution and Conceptualization

H Zouqiong - Social Science Journal for Advanced …, 2023 - ssjar.singhpublication.com
Cyber security is concerned with matters of cyber-ethics and cyber-safety. The idea of cyber
security should be introduced to and ingrained from a young age. Security countermeasures …

Developing the Role of Firewalls in Enhancing Web Security for Wireless Networks

R Narayan, NV Balaji, G Kalanandhini… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
Firewalls play a critical role in controlling incoming and outgoing community site visitors and
shielding a wireless network from malicious assaults. This technical summary focuses on the …

An empirical analysis of Cyber Crimes, their prevention measures, and laws in India

N Aggarwal, M Sehgal, A Arya - 2022 Seventh International …, 2022 - ieeexplore.ieee.org
Cybercrime is pervasive, widespread, and becoming more intertwined with other elements
of the criminal ecosystem. The Theft of a person's identity to the destruction of a nation's …

Perceived Online Tax Compliance Measures on Tax Compliance among Online Traders in Kenya

E Kiprono, E Kimitei, C Kapkiyai - American Journal of …, 2023 - journals.e-palli.com
In several developing countries, tax collection by government relied on manual taxation, but
there is now more drive towards introduction of electronic online filling of taxes. In Kenya …

[PDF][PDF] The Dark Side of Sharing Knowledge in the Social Media Era: Faculty Members' Perspectives.

KA Al-Busaidi, I Al-Wahaibi - KMIS, 2023 - scitepress.org
This pilot study examines the dark side of social media platforms (SMPs) for knowledge
sharing (KS) from knowledge management (KM) and information systems security (ISS) …