Results 61 to 70 of about 196,474 (374)
Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity
Amidst the rapid advancements in the digital landscape, the convergence of digitization and cyber threats presents new challenges for organizational security. This article presents a comprehensive framework that aims to shape the future of cyber security.
Muhammad Fakhrul Safitra+2 more
semanticscholar +1 more source
This study aims to provide actionable recommendations for leveraging digital innovation for the achievement of scalable, equitable, and transparent Net Zero Energy Transition by offering actionable recommendations. As a result of this comprehensive analysis, the review highlights the critical interplay between digital technologies and GF as vital ...
Furkan Ahmad+3 more
wiley +1 more source
A Neural Network-Based Approach for Cryptographic Function Detection in Malware
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia+5 more
doaj +1 more source
2 ...
openaire +3 more sources
Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the emerging Internet of Things (IoT) has gained a lot of attention from the government, academia, and industries in recent years. Federated cybersecurity (FC) is regarded
Bimal Ghimire, D. Rawat
semanticscholar +1 more source
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci+4 more
wiley +1 more source
Domain knowledge free cloud-IDS with lightweight embedding method
The expansion of the cloud computing market has provided a breakthrough in efficiently storing and managing data for individuals and companies. As personal and corporate data move to the cloud, diverse attacks targeting the cloud have also increased for ...
Yongsik Kim, Gunho Park, Huy Kang Kim
doaj +1 more source
Metamorphic Testing for Cybersecurity [PDF]
Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct negative testing as well as to alleviate the oracle problem in the testing of security ...
Chen, Tsong Yueh+6 more
openaire +5 more sources
CYBERSECURITY CHALLENGES IN THE AGE OF AI: THEORETICAL APPROACHES AND PRACTICAL SOLUTIONS
In the ever-evolving landscape of cybersecurity, the proliferation of artificial intelligence (AI) technologies introduces both promising advancements and daunting challenges.
Babajide Tolulope Familoni
semanticscholar +1 more source
Today, cybersecurity is considered one of the most noteworthy topics that are circulated frequently among companies in order to protect their data from hacking operations. The emergence of cyberspace contributed to the growth of electronic systems. It is
Maad M. Mijwil+3 more
semanticscholar +1 more source