Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Towards artificial intelligence-based cybersecurity: The practices and ChatGPT generated ways to combat cybercrime

MM Mijwil, M Aljanabi… - Iraqi Journal For …, 2023 - ijcsm.researchcommons.org
Today, cybersecurity is considered one of the most noteworthy topics that are circulated
frequently among companies in order to protect their data from hacking operations. The …

Privacy-centric AI and IoT solutions for smart rural farm monitoring and control

M Rahaman, CY Lin, P Pappachan, BB Gupta, CH Hsu - Sensors, 2024 - mdpi.com
The integration of artificial intelligence (AI) and the Internet of Things (IoT) in agriculture has
significantly transformed rural farming. However, the adoption of these technologies has …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

The Impact of Digital Transformation on Business Models and Competitive Advantage

K Agustian, ES Mubarok, A Zen… - Technology …, 2023 - journal.literasisainsnusantara.com
Digital transformation has become a dominant trend in the business world in recent years.
The rapid development of information and communication technology has enabled …

Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems

EH Tusher, MA Ismail, MA Rahman, AH Alenezi… - IEEE …, 2024 - ieeexplore.ieee.org
Nowadays, emails are used across almost every field, spanning from business to education.
Broadly, emails can be categorized as either ham or spam. Email spam, also known as junk …

Integrating cybersecurity risk management into strategic management: a comprehensive literature review

F Mızrak - Research Journal of Business and Management, 2023 - dergipark.org.tr
Purpose-This literature review aims to delve into the nexus between cybersecurity risk
management and strategic management, comprehensively exploring how organizations …

Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness

M Alawida, B Abu Shawar, OI Abiodun, A Mehmood… - Information, 2024 - mdpi.com
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful
generative AI model that can simulate human-like dialogues across a variety of domains …

[HTML][HTML] Modeling the medical and wellness tourism supply chain for enhanced profitability: An open innovation approach

S Dinkoksung, R Pitakaso, S Khonjun, T Srichok… - Journal of Open …, 2023 - Elsevier
This research article contributes to the advancement of the medical and wellness tourism
supply chain through the development of a robust mathematical model aimed at optimizing …