Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system

D Kumari, A Sinha, S Dutta, P Pranav - Scientific Reports, 2024 - nature.com
The constantly changing nature of cyber threats presents unprecedented difficulties for
people, institutions, and governments across the globe. Cyber threats are a major concern in …

[PDF][PDF] NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW.

R Khan, M Hasan - International Journal of Advanced …, 2017 - pdfs.semanticscholar.org
Network security has become vital for securing sensitive and confidential information of
organizations which is being shared and transferred across global networks. Various studies …

[PDF][PDF] Factors Influencing Information Security Policy Compliance Behavior in High Education Institutions: Systematic Literature Review

A Ahmed, H Abas - Advances in Social Sciences Research …, 2024 - researchgate.net
Information security policies and behaviors play a crucial role in organizations, particularly in
higher education institutions. These policies outline guidelines and best practices to protect …

Effectiveness of banking card security in the Ethiopian financial sector: PCI-DSS security standard as a lens

L Lessa, D Gebrehawariat - International Journal of Industrial …, 2023 - emerald.com
Purpose This study is aimed at assessing the information security management practice with
a focus on banking card security in selected financial institutions in Ethiopia, using an …

Man in the middle attacks against SSL/TLS: Mitigation and defeat

M Alwazzeh, S Karaman… - Journal of Cyber …, 2020 - journals.riverpublishers.com
Network security and related issues have been discussed thoroughly in this paper,
especially at transport layer security network protocol, which concern with confidentiality …

[PDF][PDF] Exploring Libyan Higher Education Institutions Employees' Information Security Policy Awareness

A Ahmed, H Abas - Advances in Social Sciences Research …, 2024 - researchgate.net
Incidents of data breach in higher education could harm students since the exposure of
sensitive student data (eg, social security numbers) could twist students into victims of …

Siber savaşta mütekabiliyet

MV Güldoğan, Ş Işıklı - AJIT-e: Academic Journal of Information …, 2022 - dergipark.org.tr
Yirminci yüzyılda hızla gelişen yarı iletken teknolojilerin gündelik hayatımıza hızlı bir şekilde
entegre olması, bilginin işlenmesi ve yönetiminde kullanılan altyapı değişikliklerini de …

A Comprehensive Network Security Management in Virtual Private Network Environment

SM Pedapudi, N Vadlamani - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Virtual Private Networks (VPNs) have become a communication medium for accessing
information, data exchange and flow of information. Many organizations require Intranet or …

[PDF][PDF] Information Security

YP Surwade, HJ Patil - E-Journal of Library and Information Science, 2019 - academia.edu
With the development of the network and information technology, Information security has
become the key of information technology in 21st Century. Today we are living in …

[PDF][PDF] Multicriteria Decision Analysis on Information Security Policy: A Prioritization Approach

JS Cabrera, ARL Reyes, CA Lasco - Advances in technology innovation, 2020 - core.ac.uk
Security is the most serious concern in the digital environment. To provide a sound and firm
security policy, a multi-holistic approach must be considered when making strategic …