[HTML][HTML] Cyber security: State of the art, challenges and future directions

WS Admass, YY Munaye, AA Diro - Cyber Security and Applications, 2024 - Elsevier
Cyber security has become a very critical concern that needs the attention of researchers,
academicians, and organizations to confidentially ensure the protection and security of …

A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions

M Ozkan-Okay, E Akin, Ö Aslan, S Kosunalp… - IEEe …, 2024 - ieeexplore.ieee.org
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … communications surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

[HTML][HTML] When llms meet cybersecurity: A systematic literature review

J Zhang, H Bu, H Wen, Y Liu, H Fei… - …, 2025 - cybersecurity.springeropen.com
The rapid development of large language models (LLMs) has opened new avenues across
various fields, including cybersecurity, which faces an evolving threat landscape and …

Cyber security in the metaverse

D Kaur, B Singh, S Rani - Handbook of Research on AI-Based …, 2023 - igi-global.com
Security in the Metaverse is a critical concern as virtual worlds continue to expand and
evolve. With an increasing number of users engaging in immersive experiences …

Detection of online phishing email using dynamic evolving neural network based on reinforcement learning

S Smadi, N Aslam, L Zhang - Decision Support Systems, 2018 - Elsevier
Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for
the detection systems in the online mode which is leading to loopholes in web-based …

Innovations of phishing defense: The mechanism, measurement and defense strategies

K Thakur, J Shan, ASK Pathan - International Journal of …, 2018 - search.proquest.com
Now-a-days, social engineering is considered to be one of the most overwhelming threats in
the field of cyber security. Social engineers, who deceive people by using their personal …

Cyber security challenges and its emerging trends on latest technologies

KM Rajasekharaiah, CS Dule… - IOP conference series …, 2020 - iopscience.iop.org
Today, due to the modern life style people have joined technology life and using more
technology for shop** as well as financial transactions in their cyber space. At the same …

Security, Privacy, Risk, and Safety Toward 5G Green Network (5G‐GN)

D Pradhan, PK Sahu, NS Goje… - Cyber security and …, 2022 - Wiley Online Library
The prevalence of mobile network–associated gadgets keeps on growing dramatically. 5G
network will give the hypothetical speed of 20 Gbps so that clients will get 100 Mbps of …

Minimizing incident response time in real-world scenarios using quantum computing

MA Serrano, LE Sánchez, A Santos-Olmo… - Software Quality …, 2024 - Springer
Abstract The Information Security Management Systems (ISMS) are global and risk-driven
processes that allow companies to develop their cybersecurity strategy by defining security …