|
|
|
Kenneth David Strang
A critical worldwide problem is that ransomware cyberattacks can be costly to organizations. Moreover, accidental employee cybercrime risk can be challenging to prevent, even by leveraging advanced computer science techniques. This exploratory project us...
ver más
|
|
|
|
|
|
|
Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective str...
ver más
|
|
|
|
|
|
|
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ...
ver más
|
|
|
|
|
|
|
Jeonggeun Jo, Jaeik Cho and Jongsub Moon
Artificial intelligence (AI) is increasingly being utilized in cybersecurity, particularly for detecting malicious applications. However, the black-box nature of AI models presents a significant challenge. This lack of transparency makes it difficult to ...
ver más
|
|
|
|
|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
|
Ammar Odeh and Anas Abu Taleb
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles. This has spurred groundbreaking advancements while concurrently posing persisten...
ver más
|
|
|
|
|
|
|
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical...
ver más
|
|
|
|
|
|
|
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain and Walton Wider
This study examines the factors influencing government employees? cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigatin...
ver más
|
|
|
|
|
|
|
Siti Noorsuriani Maon,Naffisah Mohd Hassan,Noorain Mohamad Yunus,Sri Fatiany Syed Abdul Kader Jailani,Erne Suzila Kassim
Pág. pp. 73 - 84
Digital technologies have become powerful tools in today society in many aspects. However, without proper knowledge and guidance, youth is being challenged with potential hazards of cybercrimes. Hence, the purpose of this study was to compare...
ver más
|
|
|
|
|
|
|
Serhii Yevseiev,Oleksandr Milov,Stanislav Milevskyi,Oleksandr Voitko,Maksym Kasianenko,Yevgen Melenti,Serhii Pohasii,Hrygorii Stepanov,Oleksandr Turinskyi,Serhii Faraon
Pág. 15 - 29
A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of deci...
ver más
|
|
|
|