Security in Cloud-Native Services: A Survey

T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …

A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism.

J Ferdous, R Islam, A Mahboubi, MZ Islam - IEEE Access, 2023 - ieeexplore.ieee.org
The increasing sophistication of malware threats has led to growing concerns in the anti-
malware community, as malware poses a significant danger to online users despite the …

[PDF][PDF] The evolution of ransomware: tactics, techniques, and mitigation strategies

G Nagar - International Journal of Scientific Research and …, 2024 - academia.edu
Ransomware has developed into one of the most dangerous cyber threats. It is developed
for the purpose of encrypting the data, and the owner is to pay the specified amount of …

An insight into the machine-learning-based fileless malware detection

O Khalid, S Ullah, T Ahmad, S Saeed, DA Alabbad… - Sensors, 2023 - mdpi.com
In recent years, massive development in the malware industry changed the entire landscape
for malware development. Therefore, cybercriminals became more sophisticated by …

UNCOVERING EVIDENCE OF ATTACKER BEHAVIOR ON THE NETWORK

A Yaseen - ResearchBerg Review of Science and Technology, 2020 - researchberg.com
This comprehensive research presents and investigates a diverse assessment of
interruption discovery strategies and their job in contemporary online protection. Interruption …

Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI

M Malatji, A Tolah - AI and Ethics, 2024 - Springer
Abstract As Artificial Intelligence (AI) rapidly advances and integrates into various domains,
cybersecurity emerges as a critical field grappling with both the benefits and pitfalls of AI …

[PDF][PDF] Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks

N Ravichandran, T Tewaraja, V Rajasegaran… - Preprints. org, 2024 - preprints.org
With all the sophisticated threats to network security, intrusion detection is a section of the
security technology industry that is becoming increasingly significant. In this research paper …

Dark web pedophile site users' cybersecurity concerns: A lifespan and survival analysis

J Chopin, D Décary-Hétu - Journal of Criminal Justice, 2023 - Elsevier
Purpose This paper explores the concept of criminal expertise within the context of online
pedophile community and applies rational choice theory to understand the decision-making …

Data breach: analysis, countermeasures and challenges

X Zhang, MM Yadollahi, S Dadkhah… - … of Information and …, 2022 - inderscienceonline.com
The increasing use or abuse of online personal data leads to a big data breach challenge
for individuals, businesses, and even the government. Due to the scale of online data and …

Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

J Ahn, R Hussain, K Kang, J Son - … Communications Surveys & …, 2025 - ieeexplore.ieee.org
Cryptographic network protocols play a crucial role in enabling secure data exchange over
insecure media in modern network environments. However, even minor vulnerabilities can …