Impact of phishing on users with different online browsing hours and spending habits

DS Kuraku, D Kalla - … Journal of Advanced Research in Computer …, 2023 - papers.ssrn.com
Due of an upward trend in browsing habits and time spent online, the number of phishing
attacks on online users has spiked. Phishers use fake websites, phone calls, emails, and …

Cybersecurity risk assessment in banking: methodologies and best practices

SO Dawodu, A Omotosho, OJ Akindote… - Computer Science & IT …, 2023 - fepbl.com
Cybersecurity risk assessment in banking is the process of identifying, analyzing, and
evaluating the cyber threats and vulnerabilities that may affect the confidentiality, integrity …

Artificial Intelligence‐Based Cyber Security and Digital Forensics: A Review

AK Tyagi, S Kumari, Richa - Artificial Intelligence‐Enabled …, 2024 - Wiley Online Library
Today cyber threats are becoming more sophisticated and technology is advancing at a
rapid pace, new approaches to cybersecurity and digital forensics are required. Artificial …

Modeling of Malware Propagation Under the Clustering Approach in Scale‐Free Networks

E Asadi, S Hosseini - Security and Privacy, 2025 - Wiley Online Library
In this paper, we present an innovative malware propagation model that combines epidemic
spread and clustering techniques, specifically designed for scale‐free networks. The …

[DOC][DOC] Cyber Security Education: Enhancing Cyber Security Capabilities, Navigating Trends and Challenges in a Dynamic Landscape

SM Hussain, SRK Tummalapalli… - Advances in Cyber …, 2024 - iipseries.org
In the rapidly evolving landscape of cyber security, education stands at the forefront,
adapting to meet the demands of an increasingly sophisticated digital realm. This chapter …

Investigating the Effectiveness of Birthday Attack Strategies in Cryptography Network Security

GT Chavan, S Agrawal, NN Sakhare… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
Cryptography is a crucial factor of community safety because it involves growing and
decoding mystery codes to guard touchy statistics from unauthorized right of entry. As the …

Forecasting cyber threats & pertinent alleviation technologies

ZJS Almahmoud - 2024 - eprints.bbk.ac.uk
Traditionally, cyber-attack detection relies on reactive techniques, where pattern-matching
algorithms help human experts to scan system logs and network traffic for known virus …

Penetration testing in agile cybersecurity environments

AS Alshra'a, L Al Sardy, R German - Agile Security in the Digital …, 2024 - taylorfrancis.com
Penetration testing is a vital element of agile security frameworks confirming that security
problems are addressed during the software development life cycle. In agile security …