Impact of AI on the Cyber Kill Chain: A Systematic Review
M Kazimierczak, N Habib, JH Chan… - Heliyon, 2024 - cell.com
Abstract The Cyber Kill Chain (CKC) defense model aims to assist subject matter experts in
planning, identifying, and executing against cyber intrusion activity, by outlining seven …
planning, identifying, and executing against cyber intrusion activity, by outlining seven …
Intrusion Detection System for Wireless Sensor Networks: A Machine Learning based Approach
In this era, plenty of wireless devices are being used with the support of WI-FI (Wireless
Fidelity) and need to be maintained and authorized. Wireless Sensor Networks (WSN), a …
Fidelity) and need to be maintained and authorized. Wireless Sensor Networks (WSN), a …
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Android, the world's most widely used mobile operating system, is increasingly targeted by
malware due to its open-source nature, high customizability, and integration with Google …
malware due to its open-source nature, high customizability, and integration with Google …
Software Engineering and the Adoption of Internet of Things: A Systematic Literature Review
MM Qasim, AR Abdulkareem - 2024 4th International …, 2024 - ieeexplore.ieee.org
Recent interest in integrating Internet of Things (IoT) technology with software engineering
has grown owing to its potential to transform several fields. The purpose of this research is to …
has grown owing to its potential to transform several fields. The purpose of this research is to …
Modern Mobile Malware Detection Framework Using Machine Learning and Random Forest Algorithm.
M Ababneh, A Al-Droos… - … Systems Science & …, 2024 - search.ebscohost.com
With the high level of proliferation of connected mobile devices, the risk of intrusion becomes
higher. Artificial Intelligence (AI) and Machine Learning (ML) algorithms started to feature in …
higher. Artificial Intelligence (AI) and Machine Learning (ML) algorithms started to feature in …
Machine Learning-based Malware Detection on Android Operating System using AdaBoost Algorithm and ReliefF Feature Selection Method
M Ibadullah, SA Amalina, W Ghozi… - … on Application for …, 2024 - ieeexplore.ieee.org
Technological advancements occur rapidly from year to year. Currently, we experience the
benefits of this rapid technological development, including the widespread use of …
benefits of this rapid technological development, including the widespread use of …
Design and Creation of Android-Based Learning Media in Informatics Subjects in Vocational High Schools
AR Prayudha, H Alfandri, RA Gunawan - JURNAL PTI (PENDIDIKAN …, 2024 - jpti-upiyptk.org
This research aims to determine the validity, practicality and effectiveness of designing and
making android-based Learning Media in Class X Informatics Subjects at SMK N 9 Padang …
making android-based Learning Media in Class X Informatics Subjects at SMK N 9 Padang …
Advancements and Challenges in the Intersection of Machine Learning and IoT Security
S Chithaluri - 2024 - search.proquest.com
The proliferation of IoT devices in various sectors, such as healthcare, industrial systems,
and residential areas, presents unique security vulnerabilities that conventional security …
and residential areas, presents unique security vulnerabilities that conventional security …
Revisión de literatura sobre el uso de Machine Learning enfocados a la seguridad de la información para minimizar vulnerabilidades en el sector educativo
JI Villao González, EM López Zambrano - 2024 - dspace.ups.edu.ec
Este estudio presenta una revisión exhaustiva de la literatura sobre el uso de técnicas de
Machine Learning para mejorar la seguridad de la información en el sector educativo. Se …
Machine Learning para mejorar la seguridad de la información en el sector educativo. Se …