[HTML][HTML] Adversarial machine learning in industry: A systematic literature review

FV Jedrzejewski, L Thode, J Fischbach, T Gorschek… - Computers & …, 2024 - Elsevier
Abstract Adversarial Machine Learning (AML) discusses the act of attacking and defending
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …

Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic Review

R Adriko, JRC Nurse - Information & Computer Security, 2024 - emerald.com
Purpose This study aims to offer insights into the state of research covering cybersecurity,
cyber insurance and small-to medium-sized enterprises (SMEs). It examines benefits of …

Digital deception: Generative artificial intelligence in social engineering and phishing

M Schmitt, I Flechais - Artificial Intelligence Review, 2024 - Springer
Abstract The advancement of Artificial Intelligence (AI) and Machine Learning (ML) has
profound implications for both the utility and security of our digital interactions. This paper …

[HTML][HTML] Crypto-Cognitive Exploitation: Integrating Cognitive, Social, and Technological perspectives on cryptocurrency fraud

A Perdana, HJ Jiow - Telematics and Informatics, 2024 - Elsevier
The rising prominence of cryptocurrency in global finance has unfortunately rendered it a
prime target for scams, leading to significant financial losses. This study employs Cognitive …

[HTML][HTML] The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign

A Chrysanthou, Y Pantis, C Patsakis - Computers & Security, 2024 - Elsevier
In an era dominated by digital interactions, phishing campaigns have evolved to exploit not
just technological vulnerabilities but also human traits. This study takes an unprecedented …

[HTML][HTML] Adversarial Examples on XAI-Enabled DT for Smart Healthcare Systems

NH Imam - Sensors, 2024 - mdpi.com
There have recently been rapid developments in smart healthcare systems, such as
precision diagnosis, smart diet management, and drug discovery. These systems require the …

[HTML][HTML] Authentication, Access Control and Scalability models in Internet of Things Security-A Review

M Kokila, S Reddy - Cyber Security and Applications, 2024 - Elsevier
Abstract The Internet of Things (IoT) leads to the next phase of human interaction with
technology. With the help of the IoT, physical objects can be given the ability to generate …

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

S Ahmad, M Zaman, AS AL-Shamayleh… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Advancement of the Internet has increased security risks associated with data protection and
online shop**. Several techniques compromise Internet security, including hacking, SQL …

[HTML][HTML] Representing groups of students as personas: A systematic review of persona creation, application, and trends in the educational domain

A Farooq, A Alabed, PS Msefula, RAL Tamime… - … and Education Open, 2025 - Elsevier
This study presents a comprehensive systematic review of the use of student personas in
education, drawing insights from 83 publications identified through the ACM Digital Library …

[HTML][HTML] Effects of Visual Risk Indicators on Phishing Detection Behavior: An Eye-Tracking Experiment

D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …