Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions

IH Sarker, AI Khan, YB Abushark, F Alsolami - Mobile Networks and …, 2023 - Springer
Abstract The Internet of Things (IoT) is one of the most widely used technologies today, and
it has a significant effect on our lives in a variety of ways, including social, commercial, and …

Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects

IH Sarker - Annals of Data Science, 2023 - Springer
Due to the digitization and Internet of Things revolutions, the present electronic world has a
wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a …

[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review

N Chowdhury, V Gkioulos - Computer Science Review, 2021 - Elsevier
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …

[HTML][HTML] A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022 - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

[HTML][HTML] Driving behaviour change with cybersecurity awareness

S Chaudhary - Computers & Security, 2024 - Elsevier
Organisations implementing cybersecurity awareness (CSA) should strive to positively
change employees' attitudes and behaviours. In practice, though, most of such initiatives …

[HTML][HTML] Using protection motivation theory in the design of nudges to improve online security behavior

R Van Bavel, N Rodríguez-Priego, J Vila… - International Journal of …, 2019 - Elsevier
We conducted an online experiment (n= 2024) on a representative sample of internet users
in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on …

An exploratory study of cyber hygiene behaviors and knowledge

AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …

Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

[PDF][PDF] Enhancing the random forest model via synthetic minority oversampling technique for credit-card fraud detection

FO Aghware, AA Ojugo, W Adigwe… - Journal of Computing …, 2024 - researchgate.net
Fraudsters increasingly exploit unauthorized credit card information for financial gain,
targeting unsuspecting users, especially as financial institutions expand their services to …

Susceptibility to phishing on social network sites: A personality information processing model

ED Frauenstein, S Flowerday - Computers & security, 2020 - Elsevier
Today, the traditional approach used to conduct phishing attacks through email and spoofed
websites has evolved to include social network sites (SNSs). This is because phishers are …