Threat actors' tenacity to disrupt: Examination of major cybersecurity incidents

OI Falowo, S Popoola, J Riep, VA Adewopo… - IEEE Access, 2022 - ieeexplore.ieee.org
The exponential growth in the interconnectedness of people and devices, as well as the
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …

Protective factors for developing cognitive skills against cyberattacks

M Cazares, W Fuertes, R Andrade, I Ortiz-Garcés… - Electronics, 2023 - mdpi.com
Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during
the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online …

Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices.

M Fatima, O Rehman, IMH Rahman, A Ajmal… - Future …, 2024 - search.ebscohost.com
The emergence of smart technologies and the wide adoption of the Internet of Things (IoT)
have revolutionized various sectors, yet they have also introduced significant security …

Designing Secured Services for Authentication, Authorization, and Accounting of Users

D Shevchuk, O Harasymchuk… - … in Information and …, 2023 - elibrary.kubg.edu.ua
In this paperwork service for authentication, authorization, and user management has been
designed and developed. The purpose of this work is to simplify the configuration of user …

Methodology of ISMS establishment against modern cybersecurity threats

V Susukailo, I Opirsky, O Yaremko - … Intent-Based Networking: On the QoS …, 2021 - Springer
The chapter addresses the Information Security Management System (ISMS) establishment
approach, ensuring necessary controls to avoid widespread cybersecurity threats …

Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases

G Sharma, S Vidalis, C Menon, N Anand - Multimedia Tools and …, 2023 - Springer
Proactive security plays a vital role in preventing the attack before entering active mode. In
the modern information environment, it depends on the vulnerability management …

Analysis and implementation of threat agents profiles in semi-automated manner for a network traffic in real-time information environment

G Sharma, S Vidalis, C Menon, N Anand, S Kumar - Electronics, 2021 - mdpi.com
Threat assessment is the continuous process of monitoring the threats identified in the
network of the real-time informational environment of an organisation and the business of …

[PDF][PDF] Developing of Blockchain Method in Message Interchange Systems.

V Poberezhnyk, I Opirskyy - CPITS, 2023 - ceur-ws.org
This paper examines the main blockchain and decentralized application features, their
advantages and disadvantages for use in message interchange systems, and proposes a …

[HTML][HTML] Predicting Attack Paths from Application Security Vulnerabilities Using a Multi-Layer Perceptron

S Kasturi, X Li, P Li, J Pickard - American Journal of Software …, 2024 - amjsea.org
This paper is in the series of continuing research and proposes an approach to predicting
possible attack paths from application security vulnerability-based attack trees. The attack …

Predicting Application Security Attack Paths Using Correlation Analysis, Attack Tree, and Multi-layer Perceptron

S Kasturi - 2024 - search.proquest.com
The work proposed in this research is specific to application security and ties vulnerability
data, data storage, statistical analysis, attack surface, attack tree, and predictive analytics as …