[HTML][HTML] Adversarial machine learning in industry: A systematic literature review
Abstract Adversarial Machine Learning (AML) discusses the act of attacking and defending
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …
Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic Review
R Adriko, JRC Nurse - Information & Computer Security, 2024 - emerald.com
Purpose This study aims to offer insights into the state of research covering cybersecurity,
cyber insurance and small-to medium-sized enterprises (SMEs). It examines benefits of …
cyber insurance and small-to medium-sized enterprises (SMEs). It examines benefits of …
Digital deception: Generative artificial intelligence in social engineering and phishing
Abstract The advancement of Artificial Intelligence (AI) and Machine Learning (ML) has
profound implications for both the utility and security of our digital interactions. This paper …
profound implications for both the utility and security of our digital interactions. This paper …
[HTML][HTML] Crypto-Cognitive Exploitation: Integrating Cognitive, Social, and Technological perspectives on cryptocurrency fraud
The rising prominence of cryptocurrency in global finance has unfortunately rendered it a
prime target for scams, leading to significant financial losses. This study employs Cognitive …
prime target for scams, leading to significant financial losses. This study employs Cognitive …
[HTML][HTML] The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign
In an era dominated by digital interactions, phishing campaigns have evolved to exploit not
just technological vulnerabilities but also human traits. This study takes an unprecedented …
just technological vulnerabilities but also human traits. This study takes an unprecedented …
[HTML][HTML] Adversarial Examples on XAI-Enabled DT for Smart Healthcare Systems
NH Imam - Sensors, 2024 - mdpi.com
There have recently been rapid developments in smart healthcare systems, such as
precision diagnosis, smart diet management, and drug discovery. These systems require the …
precision diagnosis, smart diet management, and drug discovery. These systems require the …
[HTML][HTML] Authentication, Access Control and Scalability models in Internet of Things Security-A Review
Abstract The Internet of Things (IoT) leads to the next phase of human interaction with
technology. With the help of the IoT, physical objects can be given the ability to generate …
technology. With the help of the IoT, physical objects can be given the ability to generate …
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and
online shop**. Several techniques compromise Internet security, including hacking, SQL …
online shop**. Several techniques compromise Internet security, including hacking, SQL …
[HTML][HTML] Representing groups of students as personas: A systematic review of persona creation, application, and trends in the educational domain
This study presents a comprehensive systematic review of the use of student personas in
education, drawing insights from 83 publications identified through the ACM Digital Library …
education, drawing insights from 83 publications identified through the ACM Digital Library …
[HTML][HTML] Effects of Visual Risk Indicators on Phishing Detection Behavior: An Eye-Tracking Experiment
D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …
attempts, in particular through email, persistently challenge organizations despite …