Threats and corrective measures for IoT security with observance of cybercrime: A survey

S Rani, A Kataria, V Sharma, S Ghosh… - Wireless …, 2021 - Wiley Online Library
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …

Video steganography: recent advances and challenges

J Kunhoth, N Subramanian, S Al-Maadeed… - Multimedia Tools and …, 2023 - Springer
Video steganography approach enables hiding chunks of secret information inside video
sequences. The features of video sequences including high capacity as well as complex …

Towards artificial intelligence-based cybersecurity: The practices and ChatGPT generated ways to combat cybercrime

MM Mijwil, M Aljanabi… - Iraqi Journal For …, 2023 - ijcsm.researchcommons.org
Today, cybersecurity is considered one of the most noteworthy topics that are circulated
frequently among companies in order to protect their data from hacking operations. The …

From Text to Insight: An Integrated CNN-BiLSTM-GRU Model for Arabic Cyberbullying Detection

EY Daraghmi, S Qadan, Y Daraghmi, R Yussuf… - IEEE …, 2024 - ieeexplore.ieee.org
Several research on cyberbullying detection have employed different deep learning and
machine learning methodologies to achieve promising outcomes. Nevertheless, most of …

Assessment of cybersecurity awareness among students of Majmaah University

T Alharbi, A Tassaddiq - Big Data and Cognitive Computing, 2021 - mdpi.com
Information exchange has become increasingly faster and efficient through the use of recent
technological advances, such as instant messaging and social media platforms …

A Comprehensive Analysis of Explainable AI for Malware Hunting

M Saqib, S Mahdavifar, BCM Fung… - ACM Computing …, 2024 - dl.acm.org
In the past decade, the number of malware variants has increased rapidly. Many
researchers have proposed to detect malware using intelligent techniques, such as Machine …

Malicious url detection using logistic regression

R Chiramdasu, G Srivastava… - … conference on omni …, 2021 - ieeexplore.ieee.org
One of the major challenges faced by the Internet in the present day is to deal with achieving
web security from ever-rising diverse types of threats. Machine learning algorithms offer …

Factors affecting cybersecurity awareness among university students

MA Alqahtani - Applied Sciences, 2022 - mdpi.com
One of the essential stages in increasing cyber security is implementing an effective security
awareness program. This work studies the present level of security knowledge among Imam …

UNCOVERING EVIDENCE OF ATTACKER BEHAVIOR ON THE NETWORK

A Yaseen - ResearchBerg Review of Science and Technology, 2020 - researchberg.com
This comprehensive research presents and investigates a diverse assessment of
interruption discovery strategies and their job in contemporary online protection. Interruption …

Do cybersecurity threats and risks have an impact on the adoption of digital banking? A systematic literature review

NN Cele, S Kwenda - Journal of Financial Crime, 2025 - emerald.com
Purpose The purpose of the study is to identify cybersecurity threats that hinder the adoption
of digital banking and provide sustainable strategies to combat cybersecurity risks in the …