The role of user behaviour in improving cyber security management
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …
engineering, and information communications technology. The term 'information security'has …
Automated cyber defence: A review
S Vyas, J Hannay, A Bolton, PP Burnap - arXiv preprint arXiv:2303.04926, 2023 - arxiv.org
Within recent times, cybercriminals have curated a variety of organised and resolute cyber
attacks within a range of cyber systems, leading to consequential ramifications to private and …
attacks within a range of cyber systems, leading to consequential ramifications to private and …
[HTML][HTML] A selective ensemble model for cognitive cybersecurity analysis
Dynamic data-driven vulnerability assessments face massive heterogeneous data contained
in, and produced by SOCs (Security Operations Centres). Manual vulnerability assessment …
in, and produced by SOCs (Security Operations Centres). Manual vulnerability assessment …
Cybersecurity risk: The business significance of ongoing tracking
SL Burton - … Interventions for Business, Technology, and Healthcare, 2023 - igi-global.com
Technology as the single solution to risk is outdated and enables cybersecurity incidents.
The no-involvement integrated focus on business and IT elements continues. Cyberattacks …
The no-involvement integrated focus on business and IT elements continues. Cyberattacks …
Exploring content moderation in the decentralised web: The pleroma case
Decentralising the Web is a desirable but challenging goal. One particular challenge is
achieving decentralised content moderation in the face of various adversaries (eg trolls). To …
achieving decentralised content moderation in the face of various adversaries (eg trolls). To …
[HTML][HTML] Understanding User Behavior for Enhancing Cybersecurity Training with Immersive Gamified Platforms
In modern digital infrastructure, cyber systems are foundational, making resilience against
sophisticated attacks essential. Traditional cybersecurity defenses primarily address …
sophisticated attacks essential. Traditional cybersecurity defenses primarily address …
Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects
H Alqahtani, G Kumar - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This comprehensive review navigates the complex domain of Domain Generation
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …
Artificial intelligence in cybersecurity: A socio-technical framing
Rapid progress in Artificial Intelligence (AI) is presenting both opportunities and threats that
promise to be transformative and disruptive to the field of cybersecurity. The current …
promise to be transformative and disruptive to the field of cybersecurity. The current …
Learning about simulated adversaries from human defenders using interactive cyber-defense games
Given the increase in cybercrime, cybersecurity analysts (ie defenders) are in high demand.
Defenders must monitor an organization's network to evaluate threats and potential …
Defenders must monitor an organization's network to evaluate threats and potential …
Explainable artificial intelligence and cybersecurity: A systematic literature review
C Mendes, TN Rios - arXiv preprint arXiv:2303.01259, 2023 - arxiv.org
Cybersecurity vendors consistently apply AI (Artificial Intelligence) to their solutions and
many cybersecurity domains can benefit from AI technology. However, black-box AI …
many cybersecurity domains can benefit from AI technology. However, black-box AI …