Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Financial cybercrime: A comprehensive survey of deep learning approaches to tackle the evolving financial crime landscape

J Nicholls, A Kuppa, NA Le-Khac - Ieee Access, 2021 - ieeexplore.ieee.org
Machine Learning and Deep Learning methods are widely adopted across financial
domains to support trading activities, mobile banking, payments, and making customer credit …

AI-driven threat detection and response: A paradigm shift in cybersecurity

A Yaseen - International Journal of Information and …, 2023 - publications.dlpress.org
The research paper delves into the transformative role of artificial intelligence (AI) in
revolutionizing cybersecurity. This study examines the historical context and evolution of AI …

[PDF][PDF] Artificial intelligence in fraud prevention: Exploring techniques and applications challenges and opportunities

OA Bello, K Olufemi - Computer Science & IT Research Journal, 2024 - researchgate.net
In today's digital age, the proliferation of online transactions, e-commerce, and digital
banking has created new opportunities for fraudsters to exploit vulnerabilities in financial …

[PDF][PDF] Front-end development and cybersecurity: A conceptual approach to building secure web applications

HO Ekpobimi, RC Kandekere… - Computer Science & IT …, 2024 - researchgate.net
Cybersecurity has become a critical concern in the digital age, where the proliferation of web
applications has created new opportunities for innovation and economic growth (Möller …

Phishing email detection using natural language processing techniques: a literature survey

S Salloum, T Gaber, S Vadera, K Shaalan - Procedia Computer Science, 2021 - Elsevier
Phishing is the most prevalent method of cybercrime that convinces people to provide
sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant …

Internet of behaviors: A survey

J Sun, W Gan, HC Chao, SY Philip… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The Internet of Behavior (IoB) is a research theme that aims to analyze human behavior data
on the Internet from the perspective of behavioral psychology, obtain insights about human …

A hybrid approach for alluring ads phishing attack detection using machine learning

MW Shaukat, R Amin, MMA Muslam, AH Alshehri, J Xie - Sensors, 2023 - mdpi.com
Phishing attacks are evolving with more sophisticated techniques, posing significant threats.
Considering the potential of machine-learning-based approaches, our research presents a …

Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning

MA Tamal, MK Islam, T Bhuiyan, A Sattar… - Frontiers in Computer …, 2024 - frontiersin.org
Introduction The dynamic and sophisticated nature of phishing attacks, coupled with the
relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In …

Generating phishing attacks using chatgpt

SS Roy, KV Naragam, S Nilizadeh - arXiv preprint arXiv:2305.05133, 2023 - arxiv.org
The ability of ChatGPT to generate human-like responses and understand context has made
it a popular tool for conversational agents, content creation, data analysis, and research and …