Cybersecurity Career Requirements: A Literature Review

M Nkongolo, N Mennega, I van Zyl - arXiv preprint arXiv:2306.09599, 2023 - arxiv.org
This study employs a systematic literature review approach to identify the requirements of a
career as a cybersecurity professional. It aims to raise public awareness regarding …

Skills expectations in cybersecurity: semantic network analysis of job advertisements

CM Graham, Y Lu - Journal of Computer Information Systems, 2023 - Taylor & Francis
Cybersecurity jobs are in demand around the country in response to the rapidly growing
number of cyberattacks on businesses and government entities. While there is some …

Deep learning technology of computer network security detection based on artificial intelligence

Q Liu, T Zhang - Computers and Electrical Engineering, 2023 - Elsevier
With the continuous progress of the information age and science and technology, how to
combine complex and changeable data with self-protection ability has become an urgent …

Email-Based cyberstalking detection on textual data using Multi-Model soft voting technique of machine learning approach

AK Gautam, A Bansal - Journal of Computer Information Systems, 2023 - Taylor & Francis
In the virtual world, many internet applications are used by a mass of people for several
purposes. Internet applications are the basic needs of people in the modern days of lifestyle …

How to build a vulnerability benchmark to overcome cyber security attacks

J Akram, L Ping - IET Information Security, 2020 - Wiley Online Library
Cybercrimes are on a dramatic rise worldwide. The crime rate is growing day by day in every
field or department which is directly or indirectly connected to the internet including …

[PDF][PDF] Ethics in cybersecurity. What are the challenges we need to be aware of and how to handle them?

D Kozhuharova, A Kirov… - Cybersecurity of Digital …, 2022 - library.oapen.org
In the field of research, the role of ethics grows more and more every year. One might be
surprised but even in the field of technology there is a necessity for experts to understand …

A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle

F Barman, N Alkaabi, H Almenhali… - ECCWS 2023 22nd …, 2023 - books.google.com
Reconnaissance and enumeration are both equally significant phases of the penetration
testing lifecycle. In hindsight, both reconnaissance and enumeration seem to be very similar …

[HTML][HTML] Security breach prediction using Artificial Neural Networks

J Jagannathan, MYM Parvees - Measurement: Sensors, 2022 - Elsevier
These days, there are many sophisticated and swiftly moving cyberthreats. Artificial Neural
Networks (ANN) are used to introduce machine learning models that boost security and add …

Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats

NM Karie, NMB Sahri, W Yang… - … Artificial Intelligence for …, 2022 - Springer
The number of cybersecurity incidents perpetrated by adversaries using modern complex
and emerging technologies is growing exponentially. To curb this threat, advanced …

[PDF][PDF] Retrieving potential cybersecurity information from hacker forums

CM Chen, DW Wen, YH Ou, WC Chao, ZX Cai - Int. J. Netw. Secur, 2021 - ijns.jalaxy.com.tw
To adapt to the rapidly evolving cyberattacks, cyber threat knowledge is essential for
organizations to gain visibility into the fast-evolving threat landscape and timely identify early …