A Comprehensive Review of AI's Current Impact and Future Prospects in Cybersecurity.

A Al Siam, M Alazab, A Awajan, N Faruqui - IEEE Access, 2025 - ieeexplore.ieee.org
The use of artificial intelligence (AI) technology signifies a significant milestone in the swiftly
evolving domain of cybersecurity. This study offers a comprehensive literature review on the …

Hybrid Classifier for Detecting Zero-Day Attacks on IoT Networks

RM Zaki, IS Naser - Mesopotamian Journal of CyberSecurity, 2024 - mesopotamian.press
Recently, Internet of Things (IoT) networks have been exposed to many electronic attacks,
giving rise to concerns about the security of these networks, where their weaknesses and …

Targeting Insider Threats and Zero-Day Vulnerabilities with Advanced Machine Learning and Behavioral Analytics

SR Wategaonkar, AT Shaki, AP Ali… - … in Technology and …, 2024 - ieeexplore.ieee.org
This study presents a revolutionary approach to cybersecurity that uses behavioural
analytics and machine learning in tandem to show how it is far better than the status quo …

Failures and Repairs: An Examination of Software System Failure

SU Rahman, N Arshid, ZA Ayaz, S Watara… - Bulletin of Business …, 2024 - bbejournal.com
The central theme of the article is to provide a better knowledge of software system failures
and how to assure, maintain, and provide the support software systems that are in …

Behavior and Characteristics of Ransomware-A Survey

NA Malik, AM Delshadi, M Ibrar… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Until a ransom is paid, ransomware, a crypto virology virus, tries to disclose or constantly
restrict access to the accused's confidential information. While simple ransomware may …

Ransomware Attacks: Tools and Techniques for Detection

K Khaliq, NZ Ab Rahim, K Hamid… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Ransomware is a sort of crypto virology virus that attempts to expose or persistently limit
access to the accused's private information until a ransom payment is made. Although some …

Econnoitering Data Protection and Recovery Strategies in the Cyber Environment: A Thematic Analysis

M Ibrar, S Riaz, Y Khan, A Asif, K Hamid… - … Journal for Electronic …, 2024 - ijeci.lgu.edu.pk
This paper discusses the performance and reliability of different strategies for database
backup and recovery within a controlled environment, focusing on the comparison between …

RanAway: A Novel Ransomware-Resilient ReFS File System

J Long, H Liang - 2024 - researchsquare.com
Ransomware has emerged as a pervasive threat in the cybersecurity landscape,
characterized by its ability to encrypt critical data and demand ransom for its release …