ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement

M Chowdhury, N Rifat, S Latif, M Ahsan… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
The field of Natural Language Processing has observed significant advancements in the
development of sophisticated conversational Artificial Intelligence systems. ChatGPT is one …

ChatGPT: A threat against the CIA triad of cyber security

MDM Chowdhury, N Rifat, M Ahsan… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
The AI revolution has brought significant changes to society. AI-powered systems can
analyze enormous amounts of data to optimize processes, improve accuracy, and cut costs …

Card skimming: a cybercrime by hackers

K Guers, MM Chowdhury, N Rifat - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
It is unfortunate that going to a gas station or automated teller machine nowadays is an
experience that makes someone feel suspicious about the machine they are using for …

Exploit security vulnerabilities by penetration testing

D Sweigert, MM Chowdhury… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
When we setup a computer network, we need to know if an attacker can get into the system.
We need to do a series of test that shows the vulnerabilities of the network setup. These …

Password Security: What Are We Doing Wrong?

DK Davis, MM Chowdhury… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Passwords are used consistently in our everyday lives. Whether it's from logging in to our
smart phones, our computers, accessing our bank, etc. We need to use passwords to protect …

IoT Security for Smart Home: Issues and Solutions

I Antzoulis, MM Chowdhury… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The Internet of Things or IoTs are becoming popular for their ability to be embedded in
various useful devices, like sensors. As a result, they are also becoming part of our domestic …

Iot security and privacy

W Detres, MM Chowdhury… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We all love buying the best new tech that comes out from Apple or Microsoft or even
Samsung. We love how their new tech crushes the boundaries on what we thought could not …

Peran Ethical Hacking dalam Memerangi Cyberthreats

QA Fitroh, B Sugiantoro - Jurnal Ilmiah Informatika, 2023 - ejournal.upbatam.ac.id
The efforts to digitize and optimize various things in the modern world will certainly highlight
issues related to cybersecurity such as data breaches, security breaches, and so on. Ethical …

Uncover Security Weakness Before the Attacker Through Penetration Testing

CD Hines, MM Chowdhury - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Penetration testing is the practice of ethical hacking of a company's resources by a
professional to find vulnerabilities to the network, systems, software, and web applications …

The relevance, effectiveness, and future prospects of cyber deception implementation within organizations

K Eng, J King, C Schillaci… - Assurance and Security …, 2024 - spiedigitallibrary.org
Artificial Intelligence (AI) and Machine Learning (ML) based systems have seen tremendous
progress in the past years. This unprecedent growth has also opened new challenges and …