E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its …
M Ammi, O Adedugbe, FM Alharby… - International Journal of …, 2022 - igi-global.com
As attackers continue to devise new means of exploiting vulnerabilities in computer systems, security personnel are doing their best to identify loopholes and threats. Analysis of threats …
E Irshad, AB Siddiqui - ICT Express, 2024 - Elsevier
With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber …
The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk …
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack forecasting, security incident investigations and security decision support. The attacker …
M Plachkinova - Communications of the Association for Information …, 2023 - aisel.aisnet.org
Cybercrime against critical infrastructures such as nuclear reactors, power plants, and dams has been increasing in frequency and severity. Recent literature regarding these types of …
Y Li, F Wu - International Journal of Distributed Sensor …, 2023 - Wiley Online Library
To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is …
Active reconnaissance is the primary source of information gathering about the infrastructure of a target network for intruders. Its main functions are host discovery and port scanning, the …
R Madarie, MW Kranenbarg, C de Poot - Computers in Human Behavior …, 2025 - Elsevier
Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological …