Online social networks security and privacy: comprehensive review and analysis
With fast-growing technology, online social networks (OSNs) have exploded in popularity
over the past few years. The pivotal reason behind this phenomenon happens to be the …
over the past few years. The pivotal reason behind this phenomenon happens to be the …
Social media analytics on Russia–Ukraine cyber war with natural language processing: Perspectives and challenges
F Sufi - Information, 2023 - mdpi.com
Utilizing social media data is imperative in comprehending critical insights on the Russia–
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …
Applications of social network analysis to managing the investigation of suspicious activities in social media platforms
Social media networks have grown rapidly as a key platform for communicating and sharing
information. Millions of users are actively accessing its features and making connections …
information. Millions of users are actively accessing its features and making connections …
[PDF][PDF] Cyber security and ethical hacking: The importance of protecting user data
Cyber risk is a danger or threat associated with the use of interconnected technological
systems. This risk occurs when one or more of the three attributes of information namely …
systems. This risk occurs when one or more of the three attributes of information namely …
A new social media-driven cyber threat intelligence
F Sufi - Electronics, 2023 - mdpi.com
Cyber threats are projected to cause USD 10.5 trillion in damage to the global economy in
2025. Comprehending the level of threat is core to adjusting cyber posture at the personal …
2025. Comprehending the level of threat is core to adjusting cyber posture at the personal …
Cyber threat prediction using dynamic heterogeneous graph learning
Predicting cyber threats is crucial for uncovering underlying security risks and proactively
preventing malicious attacks. However, predicting cyber threats and demystifying the …
preventing malicious attacks. However, predicting cyber threats and demystifying the …
Exploring lightweight deep learning solution for malware detection in IoT constraint environment
The present era is facing the industrial revolution. Machine-to-Machine (M2M)
communication paradigm is becoming prevalent. Resultantly, the computational capabilities …
communication paradigm is becoming prevalent. Resultantly, the computational capabilities …
Impression management attenuates the effect of ability on trust in economic exchange
Are competent actors still trusted when they promote themselves? The answer to this
question could have far-reaching implications for understanding trust production in a variety …
question could have far-reaching implications for understanding trust production in a variety …
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers
M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
The importance of the job role in social media cybersecurity training
FB Salamah, MA Palomino… - 2022 IEEE European …, 2022 - ieeexplore.ieee.org
Social media has become embedded in our everyday lives, personal activities and the
workplace. Thus, educating users on emerging cybersecurity challenges for social media …
workplace. Thus, educating users on emerging cybersecurity challenges for social media …