Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
YL Khaleel, MA Habeeb, AS Albahri… - Journal of Intelligent …, 2024 - degruyter.com
This study aims to perform a thorough systematic review investigating and synthesizing
existing research on defense strategies and methodologies in adversarial attacks using …
existing research on defense strategies and methodologies in adversarial attacks using …
[HTML][HTML] MIDAS: Multi-layered attack detection architecture with decision optimisation
The proliferation of cyber attacks has led to the use of data-driven detection
countermeasures, in an effort to mitigate this threat. Machine learning techniques, such as …
countermeasures, in an effort to mitigate this threat. Machine learning techniques, such as …
Social Engineering as a Major Cybersecurity Threat: Analysis of Challenges and Solutions for Organizations
B Wibowo - … Journal of Science Education and Cultural …, 2024 - ejournal.sultanpublisher.com
Social engineering is a psychological manipulation technique used by attackers to exploit
human weaknesses in information security. This research aims to identify the challenges …
human weaknesses in information security. This research aims to identify the challenges …
Strategi Efektif dalam Meningkatkan Kesadaran Keamanan Siber terhadap Ancaman Phishing di Lingkungan Perusahaan PT. XYZ
Penelitian ini bertujuan untuk mengevaluasi strategi efektif dalam meningkatkan kesadaran
keamanan siber terhadap ancaman phishing di lingkungan organisasi. Menggunakan …
keamanan siber terhadap ancaman phishing di lingkungan organisasi. Menggunakan …
Optimal Cyber Attack Strategy Using Reinforcement Learning Based on Common Vulnerability Scoring System.
BS Kim, HW Suk, YH Choi… - … in Engineering & …, 2024 - search.ebscohost.com
Currently, cybersecurity threats such as data breaches and phishing have been on the rise
due to the many different attack strategies of cyber attackers, significantly increasing risks to …
due to the many different attack strategies of cyber attackers, significantly increasing risks to …
Multi-modal Comparative Analysis on Execution of Phishing Detection using Artificial Intelligence
Phishing is the process of deceiving or stealing private or confidential information through
illicit means. This could lead to financial loss, loss of reputation, and identity theft. Hence …
illicit means. This could lead to financial loss, loss of reputation, and identity theft. Hence …
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework
The ever-evolving ways attacker continues to im prove their phishing techniques to bypass
existing state-of-the-art phishing detection methods pose a mountain of challenges to …
existing state-of-the-art phishing detection methods pose a mountain of challenges to …
Hybrid Machine Learning Model for Phishing Detection
Phishing threats have remained a long-standing information security issue for many years,
causing billions of pounds in losses both in the United Kingdom and worldwide [1]. The aim …
causing billions of pounds in losses both in the United Kingdom and worldwide [1]. The aim …
Future Trends and Challenges in Cybersecurity and Generative AI
The chapter presents a comprehensive exploration of the changing dynamics at the
intersection between the rapidly growing landscape of the interconnectivity of various …
intersection between the rapidly growing landscape of the interconnectivity of various …
Phishing Detection Using Hybrid Machine learning Techniques
RGM Helali - Zhongguo Kuangye Daxue Xuebao, 2024 - zkdx.ch
Cyber security has become a crucial component of the new digital age with more than 820
million users of internet in year 2023 and social media users are expected to reach 82.3 …
million users of internet in year 2023 and social media users are expected to reach 82.3 …