Showing 1 - 10 of 61
Internet of Things (IoT) enabled networks are highly vulnerable to cyber threats due to insecure wireless communication, resource constraint architecture, different types of IoT devices, and a high volume of sensor data being transported across the network. Therefore, IoT-compatible...
Persistent link: https://www.econbiz.de/10014434087
Data breaches have been causing havoc for many years and continue to rise, demanding a more comprehensive framework to assess their severity. This study proposes a cybersecurity risk quantification and classification framework, addressing a significant research gap in breach severity evaluation....
Persistent link: https://www.econbiz.de/10014532382
Blockchain is a distributed digital ledger technology that has revolutionized businesses, industries, and commerce by eliminating the need for a central storage and control authority. Blockchain presents time-stamped and immutable blocks of data that are not owned by any single entity but rather...
Persistent link: https://www.econbiz.de/10014532566
Global cyber-attacks significantly impact the economy, society, organizations, and individuals. Existing research on cyber-attacks lacks in demonstrating Artificial Intelligence (AI) based analytical solutions for providing country-wide cyber threat intelligence. Cyber strategists at a national...
Persistent link: https://www.econbiz.de/10014533236
Healthcare fraud is a global problem affecting both developing and developed countries. It is the deliberate attempt of the perpetrators to take undue advantage of the inefficiencies in current healthcare systems. Fraud tends to deny legitimate beneficiaries of universal health coverage,...
Persistent link: https://www.econbiz.de/10013448805
The growing number of connected Internet of Things (IoT) devices has led to the daily growth of network botnet attacks. The networks of compromised devices controlled by a single entity can be used for malicious purposes such as denial of service distributed IoT botnet attacks and theft of...
Persistent link: https://www.econbiz.de/10014520396
E-commerce technologies are increasingly adopted and used because they give companies a competitive edge and boost their profitability through access to international markets. Even though global e-commerce has grown over the past few years, many consumers lack confidence in e-commerce purchases....
Persistent link: https://www.econbiz.de/10014517304
-knowledge proof encryption ensuring data integrity and privacy. The multi-critic deep deterministic policy gradient algorithm …
Persistent link: https://www.econbiz.de/10014543365
The rapid increase in online risks is a reflection of the exponential growth of Internet of Things (IoT) networks. Researchers have proposed numerous intrusion detection techniques to mitigate the harm caused by these threats. Enterprises use intrusion detection systems (IDSs) and intrusion...
Persistent link: https://www.econbiz.de/10015107880
Cross-Site Scripting (XSS) attacks continue to pose a significant threat to web applications, compromising the security and integrity of user data. XSS is a web application vulnerability where malicious scripts are injected into websites, allowing attackers to execute arbitrary code in the...
Persistent link: https://www.econbiz.de/10015101966