Data privacy and security in it: a review of techniques and challenges
OA Farayola, OL Olorunfemi, PO Shoetan - Computer Science & IT …, 2024 - fepbl.com
In today's interconnected digital world, data privacy and security have emerged as
paramount concerns for individuals, organizations, and governments alike. This review …
paramount concerns for individuals, organizations, and governments alike. This review …
Social engineering attack types and prevention techniques-A survey
The term" Cyber Security" is getting more and more popular and important over the last few
years. Since computers and most of the devices are connected to the internet, they are likely …
years. Since computers and most of the devices are connected to the internet, they are likely …
AI's Revolutionary Role in Cyber Defense and Social Engineering
Creative methods of cybersecurity are required due to the growing complexity of cyber
threats, especially those originating from social engineering techniques. The revolutionary …
threats, especially those originating from social engineering techniques. The revolutionary …
Utilizing convolutional neural networks and word embeddings for early-stage recognition of persuasion in chat-based social engineering attacks
Social engineering is widely recognized as the key to successful cyber-attacks. Chat-based
social engineering (CSE) attacks are attracting increasing attention because of recent …
social engineering (CSE) attacks are attracting increasing attention because of recent …
Cybersecurity in Cyber–Physical Power Systems
LF Ribas Monteiro, YR Rodrigues… - Energies, 2023 - mdpi.com
The current energy transition combined with the modernization of power systems has
provided meaningful transformations in the transmission, distribution, operation, planning …
provided meaningful transformations in the transmission, distribution, operation, planning …
The Shadow of Fraud: The Emerging Danger of AI-powered Social Engineering and its Possible Cure
Social engineering (SE) attacks remain a significant threat to both individuals and
organizations. The advancement of Artificial Intelligence (AI), including diffusion models and …
organizations. The advancement of Artificial Intelligence (AI), including diffusion models and …
Gamifying requirements: An empirical analysis of game‐based technique for novices
Requirements elicitation is a process that involves gathering requirements for a given
project. Several studies have been published suggesting strategies to improve the …
project. Several studies have been published suggesting strategies to improve the …
Characterizing the evolution of psychological tactics and techniques exploited by malicious emails
T Longtchi, S Xu - arXiv preprint arXiv:2408.11586, 2024 - arxiv.org
The landscape of malicious emails and cyber social engineering attacks in general are
constantly evolving. In order to design effective defenses against these attacks, we must …
constantly evolving. In order to design effective defenses against these attacks, we must …
[PDF][PDF] Cybercrime Unmasked: Investigating cases and digital evidence.
H Azam, MI Dulloo, MH Majeed… - … Science & Artificial …, 2023 - pdfs.semanticscholar.org
The advent of rapid digital technology has opened doors to a new domain for criminal
activities, commonly termed as computer crimes. Stringent penalties have been instituted by …
activities, commonly termed as computer crimes. Stringent penalties have been instituted by …
A global cybersecurity standardization framework for healthcare informatics
Healthcare has witnessed an increased digitalization in the post-COVID world.
Technologies such as the medical Internet of Things and wearable devices are generating a …
Technologies such as the medical Internet of Things and wearable devices are generating a …