Identification and prediction of phubbing behavior: A data-driven approach

MA Rahman, M Duradoni, A Guazzini - Neural Computing and …, 2022 - Springer
Research on Phubbing has received a lot of attention in recent years from the research
community. However, the studies conducted are mainly based on linear statistics, which is a …

[HTML][HTML] Cybersecurity in a COVID-19 world: Insights on how decisions are made

M Fichtenkamm, GF Burch, J Burch - ISACA Journal, 2022 - isaca.org
The COVID-19 crisis has created a cyberpandemic 1 that is due, in large part, to decisions
made by organizational leaders and stakeholders. 2 The average cost of a data breach has …

Cybersecurity in smart cities: Detection of opposing decisions on anomalies in the computer network behavior

D Protic, L Gaur, M Stankovic, MA Rahman - Electronics, 2022 - mdpi.com
The increased use of urban technologies in smart cities brings new challenges and issues.
Cyber security has become increasingly important as many critical components of …

The Method for Identifying the Scope of Cyberattack Stages in Relation to Their Impact on Cyber-Sustainability Control over a System

Š Grigaliūnas, R Brūzgienė, A Venčkauskas - Electronics, 2023 - mdpi.com
Industry X. 0 is the new age of digitization, when information and communication systems
are strongly linked to other systems and processes and are accessed remotely from …

[PDF][PDF] Siber Güvenlik ve Savunma

Ş Sağıroğlu, M Alkan - Grafiker Yayınları, Ankara, 2018 - researchgate.net
BGD'nin vizyonu;“bilgi güvenliği alanında ulusal ve uluslararası düzeyde tarafsız, güvenilir
ve et in bir ulusal sivil toplum uruluşu olma tır.” BGD amacı doğrultusunda; tüm paydaşlarla …

Graph neural network‐based attack prediction for communication‐based train control systems

J Zhao, T Tang, B Bu, Q Li - CAAI Transactions on Intelligence …, 2024 - Wiley Online Library
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security
challenges to industrial control systems. APTs are complex multi‐step attacks, and they are …

Using data mining to discover new patterns of social media and smartphone use and emotional states

Y Al-Saggaf, MA Rahman, UK Wiil - Social Network Analysis and Mining, 2024 - Springer
Social media and smartphone use are strongly linked to users' emotional states. While
numerous studies have established that fear of missing out (FOMO), boredom, and …

[PDF][PDF] Enhancing internet of things security: evaluating machine learning classifiers for attack prediction

A Arabiat, M Altayeb - International Journal of Electrical and …, 2024 - researchgate.net
The internet of things (IoT) has contributed to improving the quality of service and
operational efficiency in many areas, such as smart cities, but this technology has faced a …

Emerging Cyber Security and Brute Force Attacks in Hospital Management Information Systems

AK Sekar, R Ramakrishnan, A Ganesh… - … Conference On Smart …, 2023 - ieeexplore.ieee.org
The information technology revolution has transformed the healthcare industry, creating a
truly" information age" among hospitals and health care organizations. With the introduction …

Number of Cyber Attacks Predicted With Deep Learning Based LSTM Model

J Siswanto, I Sembiring, A Setiawan… - JUITA: Jurnal …, 2024 - jurnalnasional.ump.ac.id
The increasing number of cyber attacks will result in various damages to the functioning of
technological infrastructure. A prediction model for the number of cyber attacks based on the …