Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and …

AT Ayedh M, AWA Wahab, MYI Idris - Applied Sciences, 2023 - mdpi.com
The number of devices connected within organisational networks through” Bring Your Own
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …

A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …

AA Al-Kadhimi, MM Singh, MNA Khalid - Applied Sciences, 2023 - mdpi.com
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …

Leveraging bring your own device for mobility of library reference services: The Nigerian perspective

AJ Adetayo - The Reference Librarian, 2021 - Taylor & Francis
Libraries in Nigeria are increasingly affected by alternative sources of information that
provide stiff competition to library reference services. Reference librarians need to adopt a …

BC-BLPM: a multi-level security access control model based on blockchain technology

X Yu, Z Shu, Q Li, J Huang - China communications, 2021 - ieeexplore.ieee.org
Traditional multi-level security (MLS) systems have the defect of centralizing authorized
facilities, which is difficult to meet the security requirements of modern distributed peer-to …

Concept and difficulties of advanced persistent threats (APT): Survey

EJ Khaleefa, DA Abdulah - International Journal of Nonlinear …, 2022 - ijnaa.semnan.ac.ir
Previously confined to nation-states and associated institutions, dangers have increasingly
penetrated the private and business sectors. Advanced Persistent Threats (APTs) are the …

DFA-AD: a distributed framework architecture for the detection of advanced persistent threats

PK Sharma, SY Moon, D Moon, JH Park - Cluster Computing, 2017 - Springer
Advanced persistent threats (APTs) are target-oriented and advanced cyber-attacks which
often leverage the bot control and customized malware techniques in order to control and …

[PDF][PDF] Security and privacy risks awareness for bring your own device (BYOD) paradigm

MM Singh, CW Chan, Z Zulkefli - International Journal of …, 2017 - pdfs.semanticscholar.org
The growing trend of BYOD in the higher education institutions creates a new form of student
learning pedagogy in which students are able to use the mobile devices for their academic …

Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment

LL Bann, MM Singh, A Samsudin - Procedia Computer Science, 2015 - Elsevier
With the advent of pervasive and ubiquitous mobile devices, Bring Your Own Device (BYOD)
trend is steadily gaining traction amongst many corporations, in allowing the extensive …

Intelligent defense using pretense against targeted attacks in cloud platforms

RL Neupane, T Neely, P Calyam, N Chettri… - Future Generation …, 2019 - Elsevier
Cloud-hosted services are being increasingly used in online businesses in eg, retail,
healthcare, manufacturing, entertainment due to benefits such as scalability and reliability …

A systemic cybercrime stakeholders architectural model

MM Singh, AA Bakar - Procedia computer science, 2019 - Elsevier
The increased of cybercrime incidents taking place in the world is at its perilous magnitude
causing losses in term of money and trust. Even though there are various cybersecurity …