Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations
S Saeed, SA Altamimi, NA Alkayyal, E Alshehri… - Sensors, 2023 - mdpi.com
This systematic literature review explores the digital transformation (DT) and cybersecurity
implications for achieving business resilience. DT involves transitioning organizational …
implications for achieving business resilience. DT involves transitioning organizational …
Transformers and large language models for efficient intrusion detection systems: A comprehensive survey
H Kheddar - arXiv preprint arXiv:2408.07583, 2024 - arxiv.org
With significant advancements in Transformers LLMs, NLP has extended its reach into many
research fields due to its enhanced capabilities in text generation and user interaction. One …
research fields due to its enhanced capabilities in text generation and user interaction. One …
Strategic cybersecurity
S AlDaajeh, S Alrabaee - Computers & Security, 2024 - Elsevier
In the contemporary ever-evolving digital landscape, the paramount importance of fortifying
national cybersecurity for safeguarding national security is unequivocal. Cybersecurity …
national cybersecurity for safeguarding national security is unequivocal. Cybersecurity …
When llms meet cybersecurity: A systematic literature review
The rapid advancements in large language models (LLMs) have opened new avenues
across various fields, including cybersecurity, which faces an ever-evolving threat landscape …
across various fields, including cybersecurity, which faces an ever-evolving threat landscape …
[PDF][PDF] Common Vulnerabilities and Exposures Assessment of Private Higher Educational Institutions Using Web Application Security
EF Mangaoang, RN Monreal - Journal of Electrical Systems, 2024 - researchgate.net
The advancements in technology has led to advancements in threats and vulnerabilities as
well. Academic websites are not spared from this. This study aims to evaluate the common …
well. Academic websites are not spared from this. This study aims to evaluate the common …
Building a diverse cybersecurity workforce: A Study on Attracting Learners with Varied Educational Backgrounds
M Saddiqa, KHK Larsen, RN Nielsen… - Journal of Cybersecurity …, 2023 - vbn.aau.dk
Cybersecurity has traditionally been perceived as a highly technical field, centered around
hacking, programming, and network defense. However, this article contends that the scope …
hacking, programming, and network defense. However, this article contends that the scope …
Development and Evaluation on Cybersecurity Behaviour Measurement Instruments for Undergraduate Students
P Ngamcharoen, N Sakdapat… - … Journal of Cyber …, 2024 - cybercrimejournal.com
Technological advancements from past to present have ushered the world into an era of
rapid information exchange, establishing a networked system that has transformed …
rapid information exchange, establishing a networked system that has transformed …
Zero-day and zero-click attacks on digital banking: a comprehensive review of double trouble
K Yasmeen, M Adnan - Risk Management, 2023 - Springer
The media has consistently covered the far-reaching consequences of Zero-Click and Zero-
Day attacks on digital banking, which have resulted in widespread disruption. Despite this …
Day attacks on digital banking, which have resulted in widespread disruption. Despite this …
22 Cybersecurity Techniques for Business and Finance Systems
H Jadwani, H Shukla, R Verma… - Data-Driven Modelling …, 2024 - books.google.com
The prevalence of the Internet causes several problems. From that first small network of
linked computers, it grew to incorporate additional machines from other governments and …
linked computers, it grew to incorporate additional machines from other governments and …
[PDF][PDF] Distributed Parallel Algorithm for Finite Element Multi-Computer System Considering Network Security Performance Evaluation
Y Li - International Journal of Network Security, 2024 - ijns.jalaxy.com.tw
In the complex network topology of traditional finite element multi-microcomputer systems,
the data transmission process can cause a series of errors. In order to improve the operation …
the data transmission process can cause a series of errors. In order to improve the operation …