[HTML][HTML] A systematic literature review and a conceptual framework proposition for advanced persistent threats (apt) detection for mobile devices using artificial …

AA Al-Kadhimi, MM Singh, MNA Khalid - Applied sciences, 2023 - mdpi.com
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …

[HTML][HTML] E-mail-based phishing attack taxonomy

J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys… - Applied sciences, 2020 - mdpi.com
The amount of fraud on the Internet is increasing along with the availability and the
popularity of the Internet around the world. One of the most common forms of Internet fraud is …

A systematic review of bring your own device (BYOD) authentication technique

F Jamal, M Taufik, AA Abdullah… - Journal of Physics …, 2020 - iopscience.iop.org
This article provides a systematic review of Bring Your Own Device (BYOD) authentication
technique. The review main goal is to identify the existing BYOD authentication technique …

A systematic approach to investigating how information security and privacy can be achieved in BYOD environments

AG Bello, D Murray, J Armarego - Information & Computer Security, 2017 - emerald.com
Purpose This paper's purpose is to provide a current best practice approach that can be
used to identify and manage bring your own device (BYOD) security and privacy risks faced …

Leveraging bring your own device for mobility of library reference services: The Nigerian perspective

AJ Adetayo - The Reference Librarian, 2021 - Taylor & Francis
Libraries in Nigeria are increasingly affected by alternative sources of information that
provide stiff competition to library reference services. Reference librarians need to adopt a …

Security challenges and cyber forensic ecosystem in IOT driven BYOD environment

MI Ali, S Kaur, A Khamparia, D Gupta, S Kumar… - IEEE …, 2020 - ieeexplore.ieee.org
The usage of Internet of Things (IoT)/Bring Your Own Devices (BYOD) has grown up
exponentially, as expected 50 Billion IoT devices will get connected by the end of 2020 in …

[PDF][PDF] Emerging threats in cyberspace: implications for national security policy and healthcare sector

S Ness, T Khinvasara - J. Eng. Res. Rep, 2024 - researchgate.net
Currently, the majority of economic, commercial, cultural, social, and governmental activity
and contacts between countries, encompassing individuals, non-governmental …

[PDF][PDF] Security and privacy risks awareness for bring your own device (BYOD) paradigm

MM Singh, CW Chan, Z Zulkefli - International Journal of …, 2017 - pdfs.semanticscholar.org
The growing trend of BYOD in the higher education institutions creates a new form of student
learning pedagogy in which students are able to use the mobile devices for their academic …

Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment

LL Bann, MM Singh, A Samsudin - Procedia Computer Science, 2015 - Elsevier
With the advent of pervasive and ubiquitous mobile devices, Bring Your Own Device (BYOD)
trend is steadily gaining traction amongst many corporations, in allowing the extensive …

Fingerprint for mobile-sensor apt detection framework (FORMAP) based on tactics techniques and procedures (TTP) and Mitre

AA Al-Kadhimi, MM Singh, T Jabar - … of the 8th International Conference on …, 2022 - Springer
Abstract Advanced Persistent Threat (APT) is a targeted attack technique utilized by a
sophisticated and expert adversary to preserve undetected access over an extended period …