Cybersecurity vulnerabilities in off-site construction
Industry 4.0 is seeking to advance traditional construction practices towards more efficient
and internet of things (IoT)-based construction practices, such as offsite construction. Offsite …
and internet of things (IoT)-based construction practices, such as offsite construction. Offsite …
A review on nature, cybercrime and best practices of digital footprints
N Jamal, JM Zain - 2022 International Conference on Cyber …, 2022 - ieeexplore.ieee.org
Information and communication technology have accelerated the rate of change in society.
As a result, digital identities have begun to form throughout this moment of transition. These …
As a result, digital identities have begun to form throughout this moment of transition. These …
Countering Russian Cybergang Ransomware Attacks Against Critical Infrastructure in the United States
DA Long - 2024 - search.proquest.com
Ransomware attacks are a growing threat to US industries, particularly critical infrastructure
systems, despite government initiatives to curb such attacks. Russian cybergangs utilizing …
systems, despite government initiatives to curb such attacks. Russian cybergangs utilizing …
Assessing the Impact and Performance of Malware Detection Systems
Malware detection systems are crucial for a wide range of reasons, including but not limited
to protection from known threats; detection of zero-day threats; protection from data …
to protection from known threats; detection of zero-day threats; protection from data …
Malware detection in Android devices Using Machine Learning
The number of devices that are using Android as their Operating System has increased
steadily over the years. There is a growing number of types of devices that are making use of …
steadily over the years. There is a growing number of types of devices that are making use of …
CyberAttacks and Artificial Intelligence: A Systematic Map**
G Hristov, A Aleksieva-Petrova… - … Scientific Conference on …, 2023 - ieeexplore.ieee.org
With the growing implementation of artificial intelligence in products that are used in
everyday life arises the threat of exploitation of vulnerabilities in them, which could lead to …
everyday life arises the threat of exploitation of vulnerabilities in them, which could lead to …
USE OF PIRATED SOFTWARE AND ITS EFFECT IN INFORMATION SECURITY
H Malisa, S Chibelenje - The African Conference of Applied …, 2024 - journals.iaa.ac.tz
The main objective was to investigate the use of pirated software and its effects on
information security. Quantitative research design was applied. Study employed quantitative …
information security. Quantitative research design was applied. Study employed quantitative …
Strategies Cybersecurity Professionals Use to Mitigate Cybersecurity Threats in Small Businesses
MB Branham - 2024 - search.proquest.com
Small business owners are concerned about incorporating security best practices, security
frameworks, and critical business functions into a cybersecurity strategy, which is necessary …
frameworks, and critical business functions into a cybersecurity strategy, which is necessary …
Malware Classification in Local System Executable Files Using Deep Learning
PG Krishna, S Kranthi, AV Krishna - … Communication Technologies and …, 2023 - Springer
One of the biggest and most severe risks on the Internet today is malicious software,
generally known as malware. Attackers are producing malware that has the ability to change …
generally known as malware. Attackers are producing malware that has the ability to change …
[PDF][PDF] Parents' Awareness of Cybersecurity
AA Alghamdi - IN THE NAME OF ALLAH, THE MOST GRACIOUS …, 2022 - m.mu.edu.sa
The main objective of this study is to investigate parents' awareness of cybersecurity in
Saudi Arabia. The era we live in imposes on all stakeholders to be aware of information …
Saudi Arabia. The era we live in imposes on all stakeholders to be aware of information …