|
|
|
Amjad Alraizza and Abdulmohsen Algarni
Ransomware attacks pose significant security threats to personal and corporate data and information. The owners of computer-based resources suffer from verification and privacy violations, monetary losses, and reputational damage due to successful ransom...
ver más
|
|
|
|
|
|
|
Amal Naitali, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These artificial media creations, made possible by deep learning algorithms, allow for the manipulatio...
ver más
|
|
|
|
|
|
|
Malak Al-Hassan, Bilal Abu-Salih and Ahmad Al Hwaitat
The lack of regulations and oversight on Online Social Networks (OSNs) has resulted in the rise of social spam, which is the dissemination of unsolicited and low-quality content that aims to deceive and manipulate users. Social spam can cause a range of ...
ver más
|
|
|
|
|
|
|
Srinath Perera, Xiaohua Jin, Alana Maurushat and De-Graft Joe Opoku
The COVID-19 pandemic has brought massive online activities and increased cybersecurity incidents and cybercrime. As a result of this, the cyber reputation of organisations has also received increased scrutiny and global attention. Due to increased cyber...
ver más
|
|
|
|
|
|
|
Olha Shulha, Iryna Yanenkova, Mykhailo Kuzub, Iskandar Muda and Viktor Nazarenko
The rapid development of the process of informatization of modern society has necessitated cybersecurity in all spheres of human activity, as the implementation of deliberate or unintentional influences on the information sphere by both external and inte...
ver más
|
|
|
|
|
|
|
Francesco Bergadano, Fabio Carretto, Fabio Cogno and Dario Ragno
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modif...
ver más
|
|
|
|