Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview

IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …

Awareness model for minimizing the effects of social engineering attacks in web applications

M Al-Khateeb, M Al-Mousa… - … Journal of Data and …, 2023 - growingscience.com
Social Engineering (SE) Attacks against information systems continue to pose a potentially
devastating impact. Security information systems are becoming increasingly significant as …

[PDF][PDF] Website phishing detection using machine learning techniques

R Alazaidah, A Al-Shaikh… - Journal of …, 2024 - digitalcommons.aaru.edu.jo
Phishing is a cybercrime that is constantly increasing in the recent years due to the
increased use of the Internet and its applications. It is one of the most common types of …

Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics

MR Al-Mousa - 2021 International Conference on Information …, 2021 - ieeexplore.ieee.org
With the widespread adoption of Internet of Things (IoT) applications around the world,
security related problems become a challenge since the number of cybercrimes that must be …

A novel framework for mobile forensics investigation process

M Moreb, S Salah, B Amro - 2023 - researchsquare.com
Investigating digital evidence by gathering, examining, and maintaining evidence that was
stored in smartphones has attracted tremendous attention and become a key part of digital …

Examining Digital Forensic Evidence for Android Applications

MR Al-Mousa, Q Al-Zaqebah… - … Arab Conference on …, 2022 - ieeexplore.ieee.org
The examination of digital forensic evidence is a science highlighting the main areas of
progress in forensic science. Various social media sites (SNS) providing e-mail services …

Security challenges review in Agile and DevOps practices

S Afaneh, MR Al-Mousa, HS Al-hamid… - 2023 International …, 2023 - ieeexplore.ieee.org
Agile and DevOps methodologies are becoming increasingly popular in software
development, as they offer many benefits to software development teams and the …

[PDF][PDF] Machine learning and data mining activity results when using projectiles in different sports

BA Gennadievich - International Journal, 2020 - academia.edu
The factor that determines the structure of competitive activity of athletes is the focus on
achieving the highest result, which reflects the specific nature of the sport. The system …

[PDF][PDF] Application layer denial of services attack detection based on stacknet

S SMADI, M ALAUTHMAN, O ALMOMANI, A SAAIDAH… - Int. J, 2020 - academia.edu
ABSTRACT Denial of Services (DoS) Attack is one of the most advanced attacks targeting
cybercriminals. The DoS attack is designed to reduce the performance of network devices by …

SINN Based Federated Learning Model for Intrusion Detection with Blockchain Technology in Digital Forensic

PP Pawar, D Kumar, R Krupa… - … Conference on Data …, 2024 - ieeexplore.ieee.org
Today, smart devices permeate every part of our lives, ushering in a new technological era
known as Internet of Things (IoT). There ration of cybersecurity risks due to the proliferation …