A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

[HTML][HTML] X-ray diffraction data analysis by machine learning methods—a review

VA Surdu, R Győrgy - Applied Sciences, 2023 - mdpi.com
X-ray diffraction (XRD) is a proven, powerful technique for determining the phase
composition, structure, and microstructural features of crystalline materials. The use of …

Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification

H Naeem, S Dong, OJ Falana, F Ullah - Expert Systems with Applications, 2023 - Elsevier
Malware has become more complicated in its purpose and abilities over time, demanding
continuous progress in detection and defense technologies. Malware designers use anti …

Application of artificial intelligence for fraudulent banking operations recognition

B Mytnyk, O Tkachyk, N Shakhovska… - Big Data and Cognitive …, 2023 - mdpi.com
This study considers the task of applying artificial intelligence to recognize bank fraud. In
recent years, due to the COVID-19 pandemic, bank fraud has become even more common …

[HTML][HTML] MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations

P Maniriho, AN Mahmood, MJM Chowdhury - Computers & Security, 2024 - Elsevier
Malware attacks continue to evolve, making detection challenging for traditional static and
dynamic analysis techniques. On the other hand, memory analysis provides valuable …

[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT

SU Qureshi, J He, S Tunio, N Zhu, A Nazir… - Journal of King Saud …, 2024 - Elsevier
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …

[PDF][PDF] Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments

MAI Mallick, R Nath - World Scientific News, 2024 - worldscientificnews.com
The exponential growth in internet usage has reshaped daily transactions, prompting
individuals and companies to increasingly engage in cyberspace rather than traditional real …

AI-Powered Fraud Detection in Banking: Safeguarding Financial Transactions

FT Johora, R Hasan, SF Farabi, J Akter… - The American journal of …, 2024 - inlibrary.uz
The banking industry's metamorphosis through digitalization has unquestionably
revolutionized accessibility and convenience for customers worldwide. However, this …

Stochastic forecasting of variable small data as a basis for analyzing an early stage of a cyber epidemic

V Kovtun, K Grochla, V Kharchenko, MA Haq… - Scientific Reports, 2023 - nature.com
Abstract Security Information and Event Management (SIEM) technologies play an important
role in the architecture of modern cyber protection tools. One of the main scenarios for the …

[HTML][HTML] MalRed: An innovative approach for detecting malware using the red channel analysis of color images

SSH Shah, N Jamil, LM Sidek, N Alturki… - Egyptian Informatics …, 2024 - Elsevier
Technological advancements have significantly progressed and innovated across various
industries. However, these advancements have also led to an increase in cyberattacks using …