A Comprehensive Review of AI's Current Impact and Future Prospects in Cybersecurity.
The use of artificial intelligence (AI) technology signifies a significant milestone in the swiftly
evolving domain of cybersecurity. This study offers a comprehensive literature review on the …
evolving domain of cybersecurity. This study offers a comprehensive literature review on the …
Hybrid Classifier for Detecting Zero-Day Attacks on IoT Networks
Recently, Internet of Things (IoT) networks have been exposed to many electronic attacks,
giving rise to concerns about the security of these networks, where their weaknesses and …
giving rise to concerns about the security of these networks, where their weaknesses and …
Targeting Insider Threats and Zero-Day Vulnerabilities with Advanced Machine Learning and Behavioral Analytics
SR Wategaonkar, AT Shaki, AP Ali… - … in Technology and …, 2024 - ieeexplore.ieee.org
This study presents a revolutionary approach to cybersecurity that uses behavioural
analytics and machine learning in tandem to show how it is far better than the status quo …
analytics and machine learning in tandem to show how it is far better than the status quo …
Failures and Repairs: An Examination of Software System Failure
SU Rahman, N Arshid, ZA Ayaz, S Watara… - Bulletin of Business …, 2024 - bbejournal.com
The central theme of the article is to provide a better knowledge of software system failures
and how to assure, maintain, and provide the support software systems that are in …
and how to assure, maintain, and provide the support software systems that are in …
Behavior and Characteristics of Ransomware-A Survey
Until a ransom is paid, ransomware, a crypto virology virus, tries to disclose or constantly
restrict access to the accused's confidential information. While simple ransomware may …
restrict access to the accused's confidential information. While simple ransomware may …
Ransomware Attacks: Tools and Techniques for Detection
Ransomware is a sort of crypto virology virus that attempts to expose or persistently limit
access to the accused's private information until a ransom payment is made. Although some …
access to the accused's private information until a ransom payment is made. Although some …
Econnoitering Data Protection and Recovery Strategies in the Cyber Environment: A Thematic Analysis
This paper discusses the performance and reliability of different strategies for database
backup and recovery within a controlled environment, focusing on the comparison between …
backup and recovery within a controlled environment, focusing on the comparison between …
RanAway: A Novel Ransomware-Resilient ReFS File System
J Long, H Liang - 2024 - researchsquare.com
Ransomware has emerged as a pervasive threat in the cybersecurity landscape,
characterized by its ability to encrypt critical data and demand ransom for its release …
characterized by its ability to encrypt critical data and demand ransom for its release …