[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

Cybersecurity awareness and education programs: a review of employee engagement and accountability

TO Abrahams, OA Farayola, S Kaggwa… - Computer Science & IT …, 2024 - fepbl.com
As organizations continue to grapple with the escalating threat landscape of cyber-attacks,
the imperative to fortify their cybersecurity defenses becomes increasingly paramount. This …

[PDF][PDF] Securing the digital supply chain: Cybersecurity best practices for logistics and ship** companies

AC Odimarha, SA Ayodeji, EA Abaku - World Journal of Advanced …, 2024 - academia.edu
The review investigates the pressing need for robust cybersecurity measures within the
logistics and ship** sector, where the digital supply chain is vulnerable to a myriad of …

Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem.

I Mustapha, Y Vaicondam, A Jahanzeb… - … of Interactive Mobile …, 2023 - search.ebscohost.com
The rapid growth of the fintech industry, driven by the proliferation of mobile applications,
has revolutionized financial services, providing unprecedented convenience to users …

Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption

O Kayode-Ajala - Applied Research in Artificial Intelligence and …, 2023 - researchberg.com
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …

A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Large language models in cybersecurity: State-of-the-art

FN Motlagh, M Hajizadeh, M Majd, P Najafi… - arxiv preprint arxiv …, 2024 - arxiv.org
The rise of Large Language Models (LLMs) has revolutionized our comprehension of
intelligence bringing us closer to Artificial Intelligence. Since their introduction, researchers …

Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques

A Kulkarni, V Balachandran… - … Communications Surveys & …, 2024 - ieeexplore.ieee.org
In the realm of cybersecurity, phishing stands as a prevalent cyber attack, where attackers
employ various tactics to deceive users into gathering their sensitive information, potentially …

[HTML][HTML] A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling

F Alqurashi, I Ahmad - Alexandria Engineering Journal, 2024 - Elsevier
Cybersecurity is crucial for protecting the privacy of digital systems, maintaining economic
stability, and ensuring national security. This study presents a comprehensive approach to …

[HTML][HTML] Enhanced feature selection using genetic algorithm for machine-learning-based phishing URL detection

E Kocyigit, M Korkmaz, OK Sahingoz, B Diri - Applied sciences, 2024 - mdpi.com
In recent years, the importance of computer security has increased due to the rapid
advancement of digital technology, widespread Internet use, and increased sophistication of …