[HTML][HTML] A literature review of Artificial Intelligence applications in railway systems

R Tang, L De Donato, N Besinović, F Flammini… - … Research Part C …, 2022 - Elsevier
Nowadays it is widely accepted that Artificial Intelligence (AI) is significantly influencing a
large number of domains, including railways. In this paper, we present a systematic literature …

Cybersecurity threats in FinTech: A systematic review

D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2024 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …

Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb

R Rawat, V Mahor, M Chouhan, K Pachlasiya… - … Conference on Network …, 2022 - Springer
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …

A modified grey wolf optimization algorithm for an intrusion detection system

A Alzaqebah, I Aljarah, O Al-Kadi, R Damaševičius - Mathematics, 2022 - mdpi.com
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …

Darkweb research: Past, present, and future trends and map** to sustainable development goals

R Raman, VK Nair, P Nedungadi, I Ray, K Achuthan - Heliyon, 2023 - cell.com
The Darkweb, part of the deep web, can be accessed only through specialized computer
software and used for illegal activities such as cybercrime, drug trafficking, and exploitation …

Sd-abm-ism: An integrated system dynamics and agent-based modeling framework for information security management in complex information systems with multi …

N Aftabi, N Moradi, F Mahroo, F Kianfar - Expert Systems with Applications, 2025 - Elsevier
The increasing complexity and dynamic nature of modern Information Systems (IS) and
evolving cybersecurity threats pose significant challenges for organizations in managing …

[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

O Sarker, A Jayatilaka, S Haggag, C Liu… - Journal of Systems and …, 2024 - Elsevier
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …

The anonymity of the dark web: A survey

J Saleem, R Islam, MA Kabir - Ieee Access, 2022 - ieeexplore.ieee.org
The dark web is a section of the Internet that is not accessible to search engines and
requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …

Evaluation and selection of a cybersecurity platform: Case of the power sector in India

R Verma, S Koul, A KV - Decision Making: Applications in …, 2023 - pure.jgu.edu.in
Maintaining interconnected infrastructures such as transportation, communication, power
grids, and pipeline networks is paramount in emerging economies. One of the critical …

The Impact of Covid-19 Pandemic on Effective Electronic Criminal Trials: A Comparative Study

OG Andini, MP Kurnia, N Nilasari, GB Andiki - Journal of Human Rights …, 2023 - jhcls.org
The widespread spread of COVID 19 influenced various aspects of life in all nations across
the globe, including the effect on the judicial and penal systems. People were unable to …