[PDF][PDF] AI-Powered Threat Intelligence: Automating Cyber Threat Analysis and Prediction
R Shad, P Broklyn, K Potter - 2024 - easychair.org
Abstract AI-powered Threat Intelligence (AITI) has emerged as a promising approach to
automate and enhance the analysis and prediction of cyber threats. In this study, we explore …
automate and enhance the analysis and prediction of cyber threats. In this study, we explore …
The Cybersecurity Implication of Extended Reality Technologies: Safeguarding Users In Immersive Environments
C Bell, A Egon, P Broklyn - Available at SSRN 4904947, 2024 - papers.ssrn.com
The rapid advancement of Extended Reality (XR) technologies, encompassing Virtual
Reality (VR), Augmented Reality (AR), and Mixed Reality (MR), has transformed the way …
Reality (VR), Augmented Reality (AR), and Mixed Reality (MR), has transformed the way …
[PDF][PDF] The Intersection of Artificial Intelligence and Cybersecurity
A Olukemi, P Broklyn, S Adablanu - Easy Chair, 2024 - easychair.org
The rapid advancement of artificial intelligence (AI) has brought about significant changes in
various industries, including cybersecurity. This paper aims to explore the intersection of AI …
various industries, including cybersecurity. This paper aims to explore the intersection of AI …
[PDF][PDF] The Evolving Thread Landscape PF Ai-Powered Cyberattacks: a Multi-Faceted Approach to Defense and Mitigate
R Shad, P Broklyn, A Egon - 2024 - easychair.org
The advent of artificial intelligence (AI) has revolutionized numerous industries, enhancing
efficiency and innovation. However, this technological advancement also presents a …
efficiency and innovation. However, this technological advancement also presents a …
Zero-Trust Security Model for Enhanced Cloud Security and Data Privacy
C Bell, P Broklyn, A Egon - Available at SSRN 4904958, 2024 - papers.ssrn.com
In the evolving landscape of cybersecurity, the zero-trust security model has emerged as a
crucial framework for enhancing cloud security and data privacy (Kindervag, 2010). Unlike …
crucial framework for enhancing cloud security and data privacy (Kindervag, 2010). Unlike …
The Impact of Quantum Computing on Post-Quantum Cryptography: Standardization And Migration Strategies
S Oladimeji, A Egon, P Broklyn - Available at SSRN 4904933, 2024 - papers.ssrn.com
The advent of quantum computing presents a paradigm shift with profound implications for
cryptography and data security. Quantum computers possess the potential to break many of …
cryptography and data security. Quantum computers possess the potential to break many of …
Social Engineering in The Age of Disinformation: A Multimodal Approach to Detection and Prevent
C Bell, A Egon, P Broklyn - Available at SSRN 4904945, 2024 - papers.ssrn.com
In the digital age, social engineering attacks have evolved alongside the proliferation of
disinformation, presenting new and complex challenges for detection and prevention. Social …
disinformation, presenting new and complex challenges for detection and prevention. Social …
DEEPFAKES AND CYBERSECURITY: DETECTION AND MITIGATION Authors
P Broklyn, A Egon, R Shad - Available at SSRN 4904874, 2024 - papers.ssrn.com
Deepfake technology, which leverages advanced artificial intelligence (AI) and machine
learning techniques to create hyper-realistic but fabricated media, has emerged as a …
learning techniques to create hyper-realistic but fabricated media, has emerged as a …
The Ethnical Implication of Autonomous Cybersecurity With Transparency And Accountability
C Bell, P Broklyn, A Egon - Available at SSRN 4904943, 2024 - papers.ssrn.com
As cybersecurity technology evolves, the integration of autonomous systems powered by
artificial intelligence (AI) and machine learning (ML) is becoming increasingly prevalent …
artificial intelligence (AI) and machine learning (ML) is becoming increasingly prevalent …
RANSOWARE: A COMPREHENSIVE INVESTIGATION Authors
P Broklyn, A Egon, R Shad - Available at SSRN 4904872, 2024 - papers.ssrn.com
Ransomware has rapidly become one of the most pervasive and damaging cyber threats in
the digital age. This form of malicious software, which encrypts a victim's data and demands …
the digital age. This form of malicious software, which encrypts a victim's data and demands …