In the last decade, cybercrime has risen considerably. One key factor is the proliferation of online cybercrime communities, where actors trade products and services, and also learn …
The current demand for remote work, remote teaching and video conferencing has brought a surge not only in network traffic, but unfortunately, in the number of attacks as well. Having …
S Sobhan, T Williams, MJH Faruk… - 2022 IEEE 46th …, 2022 - ieeexplore.ieee.org
The dark web is often discussed in taboo by many who are unfamiliar with the subject. However, this paper takes a dive into the skeleton of what constructs the dark web by …
TO Browne, M Abedin, MJM Chowdhury - International Journal of …, 2024 - Springer
This paper presents a systematic review to identify research combining artificial intelligence (AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts …
Cybersecurity Practices, Challenges, and Applications in Saudi Smart Cities: Developing and Testing Extended UTAUT3 Model Using Page 1 I I Cybersecurity Practices, Challenges, and …
S MS - 2023 International Conference on Self Sustainable …, 2023 - ieeexplore.ieee.org
The aim of this research is to predict cyber hacking breaches by using the two machine learning algorithms Novel CNN Google Net and ResNet algorithms. Materials and Methods …
Malicious hackers utilize the World Wide Web to share knowledge. Previous work has demonstrated that information mined from online hacking communities can be used as …
E Arul, A Punidha - Grenze International Journal of Engineering & …, 2022 - academia.edu
Cyber attack is an intentional and fraudulent attempt by a company or entity to gain access to another person's or organization's network. When an offender's victim's framework is …