[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

The art of cybercrime community research

J Hughes, S Pastrana, A Hutchings, S Afroz… - ACM Computing …, 2024 - dl.acm.org
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …

Optimization of a depiction procedure for an artificial intelligence-based network protection system using a genetic algorithm

P Dolezel, F Holik, J Merta, D Stursa - Applied Sciences, 2021 - mdpi.com
The current demand for remote work, remote teaching and video conferencing has brought a
surge not only in network traffic, but unfortunately, in the number of attacks as well. Having …

A review of dark web: Trends and future directions

S Sobhan, T Williams, MJH Faruk… - 2022 IEEE 46th …, 2022 - ieeexplore.ieee.org
The dark web is often discussed in taboo by many who are unfamiliar with the subject.
However, this paper takes a dive into the skeleton of what constructs the dark web by …

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications

TO Browne, M Abedin, MJM Chowdhury - International Journal of …, 2024 - Springer
This paper presents a systematic review to identify research combining artificial intelligence
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …

[图书][B] Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense

E Marin, M Almukaynizi, S Sarkar, E Nunes… - 2021 - books.google.com
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online
communication of these threat actors can help reduce the risk of attacks. This book shifts …

Cybersecurity Practices, Challenges, and applications in Saudi Smart Cities: Developing and Testing Extended UTAUT3 Model using Multi-stage Samplings.

NHT Alhalafi - 2023 - opal.latrobe.edu.au
Cybersecurity Practices, Challenges, and Applications in Saudi Smart Cities: Developing and
Testing Extended UTAUT3 Model Using Page 1 I I Cybersecurity Practices, Challenges, and …

Performance Enhancement to Improve Accuracy for the Novel CNN GoogleNet Compared AAgainst ResNet in Predicting Cyber Hacking Breaches

S MS - 2023 International Conference on Self Sustainable …, 2023 - ieeexplore.ieee.org
The aim of this research is to predict cyber hacking breaches by using the two machine
learning algorithms Novel CNN Google Net and ResNet algorithms. Materials and Methods …

A hacker-centric perspective to empower cyber defense

ES Marin - 2020 - search.proquest.com
Malicious hackers utilize the World Wide Web to share knowledge. Previous work has
demonstrated that information mined from online hacking communities can be used as …

[PDF][PDF] Malicious Firmware Attack Detection on Cloud Application using Deep Latent Dirichlet Allocation (MFA–LDA)

E Arul, A Punidha - Grenze International Journal of Engineering & …, 2022 - academia.edu
Cyber attack is an intentional and fraudulent attempt by a company or entity to gain access
to another person's or organization's network. When an offender's victim's framework is …