27   Artículos

 
en línea
Kenneth David Strang    
A critical worldwide problem is that ransomware cyberattacks can be costly to organizations. Moreover, accidental employee cybercrime risk can be challenging to prevent, even by leveraging advanced computer science techniques. This exploratory project us... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang    
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective str... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan    
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jeonggeun Jo, Jaeik Cho and Jongsub Moon    
Artificial intelligence (AI) is increasingly being utilized in cybersecurity, particularly for detecting malicious applications. However, the black-box nature of AI models presents a significant challenge. This lack of transparency makes it difficult to ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Valeria Mercuri, Martina Saletta and Claudio Ferretti    
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Ammar Odeh and Anas Abu Taleb    
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles. This has spurred groundbreaking advancements while concurrently posing persisten... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell    
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain and Walton Wider    
This study examines the factors influencing government employees? cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigatin... ver más
Revista: Information    Formato: Electrónico

 
en línea
Siti Noorsuriani Maon,Naffisah Mohd Hassan,Noorain Mohamad Yunus,Sri Fatiany Syed Abdul Kader Jailani,Erne Suzila Kassim     Pág. pp. 73 - 84
Digital technologies have become powerful tools in today society in many aspects. However, without proper knowledge and guidance, youth is   being challenged with potential hazards of cybercrimes. Hence, the purpose of this study was to compare... ver más

 
en línea
Serhii Yevseiev,Oleksandr Milov,Stanislav Milevskyi,Oleksandr Voitko,Maksym Kasianenko,Yevgen Melenti,Serhii Pohasii,Hrygorii Stepanov,Oleksandr Turinskyi,Serhii Faraon     Pág. 15 - 29
A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of deci... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »