Cybersecurity vulnerabilities in off-site construction

K Nyamuchiwa, Z Lei, C Aranas Jr - Applied Sciences, 2022 - mdpi.com
Industry 4.0 is seeking to advance traditional construction practices towards more efficient
and internet of things (IoT)-based construction practices, such as offsite construction. Offsite …

A review on nature, cybercrime and best practices of digital footprints

N Jamal, JM Zain - 2022 International Conference on Cyber …, 2022 - ieeexplore.ieee.org
Information and communication technology have accelerated the rate of change in society.
As a result, digital identities have begun to form throughout this moment of transition. These …

Countering Russian Cybergang Ransomware Attacks Against Critical Infrastructure in the United States

DA Long - 2024 - search.proquest.com
Ransomware attacks are a growing threat to US industries, particularly critical infrastructure
systems, despite government initiatives to curb such attacks. Russian cybergangs utilizing …

Assessing the Impact and Performance of Malware Detection Systems

V Verma, A Malik, I Batra - 2023 10th IEEE Uttar Pradesh …, 2023 - ieeexplore.ieee.org
Malware detection systems are crucial for a wide range of reasons, including but not limited
to protection from known threats; detection of zero-day threats; protection from data …

Malware detection in Android devices Using Machine Learning

IB Mijoya, S Khurana, N Gupta - 2022 International Conference …, 2022 - ieeexplore.ieee.org
The number of devices that are using Android as their Operating System has increased
steadily over the years. There is a growing number of types of devices that are making use of …

CyberAttacks and Artificial Intelligence: A Systematic Map**

G Hristov, A Aleksieva-Petrova… - … Scientific Conference on …, 2023 - ieeexplore.ieee.org
With the growing implementation of artificial intelligence in products that are used in
everyday life arises the threat of exploitation of vulnerabilities in them, which could lead to …

USE OF PIRATED SOFTWARE AND ITS EFFECT IN INFORMATION SECURITY

H Malisa, S Chibelenje - The African Conference of Applied …, 2024 - journals.iaa.ac.tz
The main objective was to investigate the use of pirated software and its effects on
information security. Quantitative research design was applied. Study employed quantitative …

Strategies Cybersecurity Professionals Use to Mitigate Cybersecurity Threats in Small Businesses

MB Branham - 2024 - search.proquest.com
Small business owners are concerned about incorporating security best practices, security
frameworks, and critical business functions into a cybersecurity strategy, which is necessary …

Malware Classification in Local System Executable Files Using Deep Learning

PG Krishna, S Kranthi, AV Krishna - … Communication Technologies and …, 2023 - Springer
One of the biggest and most severe risks on the Internet today is malicious software,
generally known as malware. Attackers are producing malware that has the ability to change …

[PDF][PDF] Parents' Awareness of Cybersecurity

AA Alghamdi - IN THE NAME OF ALLAH, THE MOST GRACIOUS …, 2022 - m.mu.edu.sa
The main objective of this study is to investigate parents' awareness of cybersecurity in
Saudi Arabia. The era we live in imposes on all stakeholders to be aware of information …