[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …
proactive defense against sophisticated cyber threats. While traditional security measures …
Cybersecurity awareness and education programs: a review of employee engagement and accountability
As organizations continue to grapple with the escalating threat landscape of cyber-attacks,
the imperative to fortify their cybersecurity defenses becomes increasingly paramount. This …
the imperative to fortify their cybersecurity defenses becomes increasingly paramount. This …
[PDF][PDF] Securing the digital supply chain: Cybersecurity best practices for logistics and ship** companies
AC Odimarha, SA Ayodeji, EA Abaku - World Journal of Advanced …, 2024 - academia.edu
The review investigates the pressing need for robust cybersecurity measures within the
logistics and ship** sector, where the digital supply chain is vulnerable to a myriad of …
logistics and ship** sector, where the digital supply chain is vulnerable to a myriad of …
Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem.
The rapid growth of the fintech industry, driven by the proliferation of mobile applications,
has revolutionized financial services, providing unprecedented convenience to users …
has revolutionized financial services, providing unprecedented convenience to users …
Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption
O Kayode-Ajala - Applied Research in Artificial Intelligence and …, 2023 - researchberg.com
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …
activities, underscoring the need for robust security measures. This research delves into the …
A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
Large language models in cybersecurity: State-of-the-art
The rise of Large Language Models (LLMs) has revolutionized our comprehension of
intelligence bringing us closer to Artificial Intelligence. Since their introduction, researchers …
intelligence bringing us closer to Artificial Intelligence. Since their introduction, researchers …
Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques
A Kulkarni, V Balachandran… - … Communications Surveys & …, 2024 - ieeexplore.ieee.org
In the realm of cybersecurity, phishing stands as a prevalent cyber attack, where attackers
employ various tactics to deceive users into gathering their sensitive information, potentially …
employ various tactics to deceive users into gathering their sensitive information, potentially …
[HTML][HTML] A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling
F Alqurashi, I Ahmad - Alexandria Engineering Journal, 2024 - Elsevier
Cybersecurity is crucial for protecting the privacy of digital systems, maintaining economic
stability, and ensuring national security. This study presents a comprehensive approach to …
stability, and ensuring national security. This study presents a comprehensive approach to …
[HTML][HTML] Enhanced feature selection using genetic algorithm for machine-learning-based phishing URL detection
In recent years, the importance of computer security has increased due to the rapid
advancement of digital technology, widespread Internet use, and increased sophistication of …
advancement of digital technology, widespread Internet use, and increased sophistication of …