Threats and corrective measures for IoT security with observance of cybercrime: A survey
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …
and comfort. IoT has contributed significantly to numerous application areas. The stormy …
Video steganography: recent advances and challenges
Video steganography approach enables hiding chunks of secret information inside video
sequences. The features of video sequences including high capacity as well as complex …
sequences. The features of video sequences including high capacity as well as complex …
Towards artificial intelligence-based cybersecurity: The practices and ChatGPT generated ways to combat cybercrime
Today, cybersecurity is considered one of the most noteworthy topics that are circulated
frequently among companies in order to protect their data from hacking operations. The …
frequently among companies in order to protect their data from hacking operations. The …
From Text to Insight: An Integrated CNN-BiLSTM-GRU Model for Arabic Cyberbullying Detection
Several research on cyberbullying detection have employed different deep learning and
machine learning methodologies to achieve promising outcomes. Nevertheless, most of …
machine learning methodologies to achieve promising outcomes. Nevertheless, most of …
Assessment of cybersecurity awareness among students of Majmaah University
Information exchange has become increasingly faster and efficient through the use of recent
technological advances, such as instant messaging and social media platforms …
technological advances, such as instant messaging and social media platforms …
A Comprehensive Analysis of Explainable AI for Malware Hunting
In the past decade, the number of malware variants has increased rapidly. Many
researchers have proposed to detect malware using intelligent techniques, such as Machine …
researchers have proposed to detect malware using intelligent techniques, such as Machine …
Malicious url detection using logistic regression
R Chiramdasu, G Srivastava… - … conference on omni …, 2021 - ieeexplore.ieee.org
One of the major challenges faced by the Internet in the present day is to deal with achieving
web security from ever-rising diverse types of threats. Machine learning algorithms offer …
web security from ever-rising diverse types of threats. Machine learning algorithms offer …
Factors affecting cybersecurity awareness among university students
MA Alqahtani - Applied Sciences, 2022 - mdpi.com
One of the essential stages in increasing cyber security is implementing an effective security
awareness program. This work studies the present level of security knowledge among Imam …
awareness program. This work studies the present level of security knowledge among Imam …
UNCOVERING EVIDENCE OF ATTACKER BEHAVIOR ON THE NETWORK
A Yaseen - ResearchBerg Review of Science and Technology, 2020 - researchberg.com
This comprehensive research presents and investigates a diverse assessment of
interruption discovery strategies and their job in contemporary online protection. Interruption …
interruption discovery strategies and their job in contemporary online protection. Interruption …
Investigating the effect of students' knowledge, beliefs, and digital citizenship skills on the prevention of cybercrime
HA Althibyani, AM Al-Zahrani - Sustainability, 2023 - mdpi.com
The growing prevalence of cybercrime, particularly among young adults, necessitates the
promotion of digital citizenship to educate students about responsible online behavior and to …
promotion of digital citizenship to educate students about responsible online behavior and to …