Data privacy and security in it: a review of techniques and challenges

OA Farayola, OL Olorunfemi, PO Shoetan - Computer Science & IT …, 2024 - fepbl.com
In today's interconnected digital world, data privacy and security have emerged as
paramount concerns for individuals, organizations, and governments alike. This review …

Social engineering attack types and prevention techniques-A survey

R Salama, F Al-Turjman, S Bhatla… - … and Networking (CICTN …, 2023 - ieeexplore.ieee.org
The term" Cyber Security" is getting more and more popular and important over the last few
years. Since computers and most of the devices are connected to the internet, they are likely …

AI's Revolutionary Role in Cyber Defense and Social Engineering

MI Khan, A Arif, ARA Khan - International Journal of …, 2024 - jurnal.itscience.org
Creative methods of cybersecurity are required due to the growing complexity of cyber
threats, especially those originating from social engineering techniques. The revolutionary …

Utilizing convolutional neural networks and word embeddings for early-stage recognition of persuasion in chat-based social engineering attacks

N Tsinganos, I Mavridis, D Gritzalis - IEEE Access, 2022 - ieeexplore.ieee.org
Social engineering is widely recognized as the key to successful cyber-attacks. Chat-based
social engineering (CSE) attacks are attracting increasing attention because of recent …

Cybersecurity in Cyber–Physical Power Systems

LF Ribas Monteiro, YR Rodrigues… - Energies, 2023 - mdpi.com
The current energy transition combined with the modernization of power systems has
provided meaningful transformations in the transmission, distribution, operation, planning …

The Shadow of Fraud: The Emerging Danger of AI-powered Social Engineering and its Possible Cure

J Yu, Y Yu, X Wang, Y Lin, M Yang, Y Qiao… - arXiv preprint arXiv …, 2024 - arxiv.org
Social engineering (SE) attacks remain a significant threat to both individuals and
organizations. The advancement of Artificial Intelligence (AI), including diffusion models and …

Gamifying requirements: An empirical analysis of game‐based technique for novices

A Yasin, R Fatima, Z JiangBin… - Journal of Software …, 2024 - Wiley Online Library
Requirements elicitation is a process that involves gathering requirements for a given
project. Several studies have been published suggesting strategies to improve the …

Characterizing the evolution of psychological tactics and techniques exploited by malicious emails

T Longtchi, S Xu - arXiv preprint arXiv:2408.11586, 2024 - arxiv.org
The landscape of malicious emails and cyber social engineering attacks in general are
constantly evolving. In order to design effective defenses against these attacks, we must …

[PDF][PDF] Cybercrime Unmasked: Investigating cases and digital evidence.

H Azam, MI Dulloo, MH Majeed… - … Science & Artificial …, 2023 - pdfs.semanticscholar.org
The advent of rapid digital technology has opened doors to a new domain for criminal
activities, commonly termed as computer crimes. Stringent penalties have been instituted by …

A global cybersecurity standardization framework for healthcare informatics

K Gupta, V Mishra, A Makkar - IEEE Journal of Biomedical and …, 2024 - ieeexplore.ieee.org
Healthcare has witnessed an increased digitalization in the post-COVID world.
Technologies such as the medical Internet of Things and wearable devices are generating a …