[HTML][HTML] A literature review of Artificial Intelligence applications in railway systems
Nowadays it is widely accepted that Artificial Intelligence (AI) is significantly influencing a
large number of domains, including railways. In this paper, we present a systematic literature …
large number of domains, including railways. In this paper, we present a systematic literature …
Cybersecurity threats in FinTech: A systematic review
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb
A proposed study provides an annotated list of SLR (Systematic literature Review) for use by
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …
dark web (DW) researchers, cyber experts, and security agencies in the investigation and …
A modified grey wolf optimization algorithm for an intrusion detection system
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …
of Internet services and applications over computer networks, posing a threat to the service's …
Darkweb research: Past, present, and future trends and map** to sustainable development goals
The Darkweb, part of the deep web, can be accessed only through specialized computer
software and used for illegal activities such as cybercrime, drug trafficking, and exploitation …
software and used for illegal activities such as cybercrime, drug trafficking, and exploitation …
Sd-abm-ism: An integrated system dynamics and agent-based modeling framework for information security management in complex information systems with multi …
The increasing complexity and dynamic nature of modern Information Systems (IS) and
evolving cybersecurity threats pose significant challenges for organizations in managing …
evolving cybersecurity threats pose significant challenges for organizations in managing …
[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
The anonymity of the dark web: A survey
J Saleem, R Islam, MA Kabir - Ieee Access, 2022 - ieeexplore.ieee.org
The dark web is a section of the Internet that is not accessible to search engines and
requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …
requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …
Evaluation and selection of a cybersecurity platform: Case of the power sector in India
Maintaining interconnected infrastructures such as transportation, communication, power
grids, and pipeline networks is paramount in emerging economies. One of the critical …
grids, and pipeline networks is paramount in emerging economies. One of the critical …
The Impact of Covid-19 Pandemic on Effective Electronic Criminal Trials: A Comparative Study
The widespread spread of COVID 19 influenced various aspects of life in all nations across
the globe, including the effect on the judicial and penal systems. People were unable to …
the globe, including the effect on the judicial and penal systems. People were unable to …