Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations

S Saeed, SA Altamimi, NA Alkayyal, E Alshehri… - Sensors, 2023 - mdpi.com
This systematic literature review explores the digital transformation (DT) and cybersecurity
implications for achieving business resilience. DT involves transitioning organizational …

Transformers and large language models for efficient intrusion detection systems: A comprehensive survey

H Kheddar - arXiv preprint arXiv:2408.07583, 2024 - arxiv.org
With significant advancements in Transformers LLMs, NLP has extended its reach into many
research fields due to its enhanced capabilities in text generation and user interaction. One …

Strategic cybersecurity

S AlDaajeh, S Alrabaee - Computers & Security, 2024 - Elsevier
In the contemporary ever-evolving digital landscape, the paramount importance of fortifying
national cybersecurity for safeguarding national security is unequivocal. Cybersecurity …

When llms meet cybersecurity: A systematic literature review

J Zhang, H Bu, H Wen, Y Chen, L Li, H Zhu - arXiv preprint arXiv …, 2024 - arxiv.org
The rapid advancements in large language models (LLMs) have opened new avenues
across various fields, including cybersecurity, which faces an ever-evolving threat landscape …

[PDF][PDF] Common Vulnerabilities and Exposures Assessment of Private Higher Educational Institutions Using Web Application Security

EF Mangaoang, RN Monreal - Journal of Electrical Systems, 2024 - researchgate.net
The advancements in technology has led to advancements in threats and vulnerabilities as
well. Academic websites are not spared from this. This study aims to evaluate the common …

Building a diverse cybersecurity workforce: A Study on Attracting Learners with Varied Educational Backgrounds

M Saddiqa, KHK Larsen, RN Nielsen… - Journal of Cybersecurity …, 2023 - vbn.aau.dk
Cybersecurity has traditionally been perceived as a highly technical field, centered around
hacking, programming, and network defense. However, this article contends that the scope …

Development and Evaluation on Cybersecurity Behaviour Measurement Instruments for Undergraduate Students

P Ngamcharoen, N Sakdapat… - … Journal of Cyber …, 2024 - cybercrimejournal.com
Technological advancements from past to present have ushered the world into an era of
rapid information exchange, establishing a networked system that has transformed …

Zero-day and zero-click attacks on digital banking: a comprehensive review of double trouble

K Yasmeen, M Adnan - Risk Management, 2023 - Springer
The media has consistently covered the far-reaching consequences of Zero-Click and Zero-
Day attacks on digital banking, which have resulted in widespread disruption. Despite this …

22 Cybersecurity Techniques for Business and Finance Systems

H Jadwani, H Shukla, R Verma… - Data-Driven Modelling …, 2024 - books.google.com
The prevalence of the Internet causes several problems. From that first small network of
linked computers, it grew to incorporate additional machines from other governments and …

[PDF][PDF] Distributed Parallel Algorithm for Finite Element Multi-Computer System Considering Network Security Performance Evaluation

Y Li - International Journal of Network Security, 2024 - ijns.jalaxy.com.tw
In the complex network topology of traditional finite element multi-microcomputer systems,
the data transmission process can cause a series of errors. In order to improve the operation …