Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Towards artificial intelligence-based cybersecurity: The practices and ChatGPT generated ways to combat cybercrime
Today, cybersecurity is considered one of the most noteworthy topics that are circulated
frequently among companies in order to protect their data from hacking operations. The …
frequently among companies in order to protect their data from hacking operations. The …
Privacy-centric AI and IoT solutions for smart rural farm monitoring and control
The integration of artificial intelligence (AI) and the Internet of Things (IoT) in agriculture has
significantly transformed rural farming. However, the adoption of these technologies has …
significantly transformed rural farming. However, the adoption of these technologies has …
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
The Impact of Digital Transformation on Business Models and Competitive Advantage
Digital transformation has become a dominant trend in the business world in recent years.
The rapid development of information and communication technology has enabled …
The rapid development of information and communication technology has enabled …
Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems
Nowadays, emails are used across almost every field, spanning from business to education.
Broadly, emails can be categorized as either ham or spam. Email spam, also known as junk …
Broadly, emails can be categorized as either ham or spam. Email spam, also known as junk …
Integrating cybersecurity risk management into strategic management: a comprehensive literature review
F Mızrak - Research Journal of Business and Management, 2023 - dergipark.org.tr
Purpose-This literature review aims to delve into the nexus between cybersecurity risk
management and strategic management, comprehensively exploring how organizations …
management and strategic management, comprehensively exploring how organizations …
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful
generative AI model that can simulate human-like dialogues across a variety of domains …
generative AI model that can simulate human-like dialogues across a variety of domains …
[HTML][HTML] Modeling the medical and wellness tourism supply chain for enhanced profitability: An open innovation approach
This research article contributes to the advancement of the medical and wellness tourism
supply chain through the development of a robust mathematical model aimed at optimizing …
supply chain through the development of a robust mathematical model aimed at optimizing …