Securing industrial control systems: components, cyber threats, and machine learning-driven defense strategies
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition
(SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers …
(SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers …
Advancements in Detection and Mitigation: Fortifying Against APTs-A Comprehensive Review
Organizations' cyber security posture is severely challenged by Advanced Persistent Threats
(APTs), necessitating a multifaceted defense strategy. Traditional methods, machine …
(APTs), necessitating a multifaceted defense strategy. Traditional methods, machine …
The evolution of cyber resilience frameworks in network security: a conceptual analysis
MO Akinsanya, CC Ekechi, CD Okeke - Computer Science & IT Research …, 2024 - fepbl.com
Abstract The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual
Analysis provides a comprehensive overview of the development and application of cyber …
Analysis provides a comprehensive overview of the development and application of cyber …
AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access …
This comprehensive study explores the integration and effectiveness of Artificial Intelligence
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
Cybersecurity's role in environmental protection and sustainable development: Bridging technology and sustainability goals
SC Obasi, NO Solomon, OA Adenekan… - Computer Science & IT …, 2024 - fepbl.com
This study investigates the pivotal role of cybersecurity in bolstering environmental
protection and sustainable development, a critical yet underexplored nexus in contemporary …
protection and sustainable development, a critical yet underexplored nexus in contemporary …
Empowering healthcare with IoMT: Evolution, machine learning integration, security, and interoperability challenges
The Internet of Medical Things (IoMT) is the subset of the Internet of Things (IoT) that
connects multiple medical devices, collect information/data from devices, and transmits and …
connects multiple medical devices, collect information/data from devices, and transmits and …
Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …
The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities
AD Sontan, SV Samuel - World Journal of Advanced Research and …, 2024 - wjarr.com
The fusion of artificial intelligence (AI) with cybersecurity represents a paradigm shift in our
efforts to safeguard digital assets against a dynamic threat landscape. This manuscript …
efforts to safeguard digital assets against a dynamic threat landscape. This manuscript …
Improving Healthcare Prediction of Diabetic Patients Using KNN Imputed Features and Tri-Ensemble Model
K Alnowaiser - IEEE Access, 2024 - ieeexplore.ieee.org
Objective: Diabetes ranks as the most prevalent ailment in developing nations. Vital steps to
mitigate the consequences of diabetes include early detection and expert medical …
mitigate the consequences of diabetes include early detection and expert medical …
Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …
play a vital role in protecting personal information and digital assets from unauthorized use …