Results for 'Cyber Security'

991 found
Order:
  1. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):138-157.
    Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. LEGALITY OR OTHERWISE FOR THE IMPOSITION OF CYBER SECURITY LEVY IN NIGERIA.Chioma Nwabachili - 2025 - Nnamdi Azikiwe University Journal of International Law and Jurisprudence 16 (1):195-123.
    The growing threats of cyber-attacks has undoubtedly, prompted the need for improved security measures to combat these issues and mitigate the resultant consequences. Thus, the cyber security levy is aimed at providing dedicated and adequate funding for the actualization of cyber security initiatives in Nigeria. However, the implementation of cybersecurity levy in Nigeria has generated unimagined public resistance. This study therefore sought to examine the Legality or otherwise of the imposition of cybersecurity levy in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. LEGALITY OR OTHERWISE FOR THE IMPOSITION OF CYBER SECURITY LEVY IN NIGERIA.Chioma Nwabachili & Chinemelu Nnoyelu - 2025 - Nnamdi Azikiwe University Journal of International Law and Jurisprudence 16 (1):195-213.
    The growing threats of cyber-attacks has undoubtedly, prompted the need for improved security measures to combat these issues and mitigate the resultant consequences. Thus, the cyber security levy is aimed at providing dedicated and adequate funding for the actualization of cyber security initiatives in Nigeria. However, the implementation of cybersecurity levy in Nigeria has generated unimagined public resistance. This study therefore sought to examine the Legality or otherwise of the imposition of cybersecurity levy in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. AI Powered SOCs Detect and Respond to Cyber Security Threats in Real Time by using Deep Learning.Kadari Rohith DrK V. Shiny - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The increasing complexity and volume of cyber threats necessitate a more advanced and proactive approach to cybersecurity. Traditional Security Operations Centers (SOCs) rely on rule-based systems and manual analysis, which are often insufficient to counter evolving attack vectors. Artificial Intelligence (AI), particularly Machine Learning (ML) and Blockchain technology, has emerged as a game-changer in enhancing SOC operations, improving threat detection, response, and mitigation capabilities. Machine Learning algorithms can analyze vast amounts of security data in real time, identifying (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. AI vs Cyber Threats: Real-World Case Studies on Securing Healthcare Data.Nushra Tul Zannat Sabira Arefin - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):396-404.
    The increasing rate and sophistication of cyber attacks pose a major risk to health data security. Traditional security systems cannot handle advanced ransomware, insider threats, and phishing attacks and hence incorporation of artificial intelligence (AI) into cybersecurity solutions becomes the need of the hour. AI-based security solutions leverage machine learning, behavior analysis, and real-time anomaly detection to identify and counter threats before they affect sensitive patient information. This study examines real-world case studies where AI successfully prevented (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. AI-Powered Cloud Security: Revolutionizing Cyber Defense in the Digital Age.V. Talati Dhruvitkumar - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (3):4762-4768.
    The rapid evolution of cloud computing and the increasing sophistication of cyber threats have necessitated a paradigm shift in the approach to cybersecurity. The rapid growth of cloud computing has revolutionized business operations with unparalleled scalability, flexibility, and access to enormous computational power. Nevertheless, exponential growth has also led to an exponential rise in security threats, with cloud environments being the main target for cyberattacks. Conventional security controls lag behind the rising complexity of these threats. Artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Role of AI in Cyber Risk Management: Predictive Analytics for Security Incident Forecasting and Mitigation.Vishal Sresth - 2021 - International Journal of Research and Analytical Reviews 8 (2).
    The growing sophistication and frequency of cyber threats stressed the limitations of traditional reactive cyber security approaches. Organizations are turning to Artificial Intelligence (AI) to improve cyber risk management through predictive capacities. This article investigates the role of AI-oriented predictive analysis in providing and mitigating security incidents. Analyzing historical cyber safety data and leveraging machine learning models as a temporal series forecast, anomaly detection, and supervised classification-ESTE study evaluate the ability of AI systems to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Development and Deployment of a Secure Deep Learning Framework for Cyber Attack Prediction in Computer Networks.DrK. Mekala M. Dharani, A. P., P. Saikrishna, A. P., C. Sivakumar, A. P. - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4):3114-3121.
    This research develops a CNN-based deep learning model to predict cyberattacks in computer networks and compares it with an LSTM model. Materials and Methods: It considered two groups: Group 1 (LSTM) and Group 2 (CNN) of 26 samples each with a G Power of 80%, a threshold of 0.05, and a 95% confidence interval. Result: The CNN model outperformed the LSTM model in accuracy, 92.56% to 96.74%, while the LSTM model ranged between 85.42% to 91.87%. In addition, CNN had lower (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. ADB Debugging – Security Risks and Investigations.Dara Sai Ganesh R. Prathiba - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9343-9347.
    With the widespread adoption of mobile devices, Android Debug Bridge (ADB) has become a vital utility for developers and system administrators. However, its open nature presents significant security concerns when left unsecured. This project addresses the potential threats posed by improper ADB usage and introduces a custom-built forensic and security analysis tool designed for cyber security analysts and law enforcement professionals. Leveraging ADB commands, the tool extracts critical data such as logs, installed applications, and system information. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Security in Storage Area Networks: A Technical Overview.Talluri Durvasulu Mohan Babu - 2025 - International Journal of Advances in Engineering and Management 7 (2):368-376.
    Storage Area Network (SAN) security has emerged as a critical component of modern enterprise infrastructure, addressing the challenges posed by exponential data growth and evolving cyber threats. This technical article examines the fundamental components and implementation strategies for securing SAN environments, encompassing access control management, data protection mechanisms, network security infrastructure, physical security controls, compliance frameworks, and best practices. The comprehensive article covers advanced technologies including artificial intelligence-driven monitoring systems, quantumresistant encryption protocols, and automated incident response (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Issues and Challenges of Cyber Crime in India: An Ethical Perspective.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
    The present paper is an attempt to discuss issues and challenges of Cyber Crime in India from an ethical perspective. Ethics is a branch of philosophy which deals with what is considered to be right or wrong. The ethics centers and program devoted to busin age for several re crime’. The advancement ess ethics, legal ethics, bioethics, medical ethics, engineering ethics, and computer ethics have sprung up. Cyber crime is emerging as a serious threat. Computer Technology is one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Network Security Threat Detection in IoT-Enabled Smart Cities.Reddy Pothireddy Nirup Kumar - 2022 - International Journal of Scientific Research in Science and Technology 9 (4):784-799.
    Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much more (...) resilience, decreasing possible attack vectors. This makes the integration of various features like AI, blockchain, and IDS for a solid IoT security a must. Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One-Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much more security resilience, decreasing possible attack vectors. This makes the integration of various features like AI, blockchain, and IDS for a solid IoT security a must. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  19. Multi-Cloud Environments: Reducing Security Risks in Distributed Architectures.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5 (1):1-6.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective (...)
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  20. Fortifying Financial Systems: Exploring the Intersection of Microservices and Banking Security.Roshan Mahant Sumit Bhatnagar - 2024 - International Research Journal of Engineering and Technology 11 (8):748-758.
    As part of their digital transformation, financial service companies can greatly benefit from the implementation of a microservice architecture. We can build a service-oriented architecture (SOA) application using the architecture to enhance its overall performance and maintainability. This enables the application to consist of several smaller components that operate independently and simultaneously. In the financial services industry, the accuracy of artifact states holds immense significance. Given that an inaccurate artifact state or anomalous artifact operation(s) could potentially ruin the entire application, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  21. Enhancing Multi-Cloud Security with Quantum-Resilient AI for Anomaly Detection.V. Talati Dhruvitkumar - 2022 - International Journal of Science and Research Archive 13 (3):629-638.
    With more and more companies moving to cloud platforms, adequate cloud security is the topmost priority for organizations today. Conventional security tools never identify sophisticated cyber-attacks, and thus AI-based real-time anomaly detection is the need of the hour. This research investigates the application of cutting-edge machine learning, deep learning, and security analytics in identifying and handling security anomalies from cloud logs. Our methodology utilizes hybrid AI models, federated learning, and graph neural networks to provide more (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  22. MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  23. Enhancing data security and regulatory compliance in AI-driven cloud ecosystems: Strategies for advanced information governance.V. Talati Dhruvitkumar - 2022 - International Journal of Science and Research Archive 15 (3).
    This study examines adaptive information governance models to address the key issues of AI-based cloud environments, in the end aiming to enable enhanced data security and regulatory compliance. Conventional governance models fail to respond to complexity issues posed by AI-cloud integration, with this resulting in incident response shortcomings, privacy laws, and regulatory compliance identification. In response to these weaknesses, this research analyzes governance elements such as Privacy-Enhancing Technologies (PETs), ethical regulation, and incident response models using sophisticated quantitative methods such (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  24. Securing the Distributed Workforce: A Framework for Enterprise Cybersecurity in the Post-COVID Era.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2022 - International Journal of Advanced Research in Education and Technology 9 (2):594-602.
    COVID-19 is the new standard for forced changes in the workforce, forcing the adoption of remote and hybrid work environments globally. It was in the period of this rapid adoption of distributed work environments that new opportunities for flexibility and productivity were opened up, but fundamental weaknesses of conventional notions of cybersecurity were unveiled. As employees connect to company networks from a plethora of different places and different types of devices, situations were complex at the corporate level to ensure that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Automated Cyber Threat Identification and Natural Language Processing.Kuruvamanikindi Venkatesh, M. Sai Kumar, Shaik Mohammed Maaz, Surekari Yashwanth Teja & Dr K. Pavan Kumar - 2025 - International Journal of Scientific Research in Science, Engineering and Technology 12 (3).
    The time window between the disclosure of a new cyber vulnerability and its use by cybercriminals has been getting smaller and smaller over time. Recent episodes, such as the Log4j vulnerability, exemplify this well. Within hours after the exploit being released, attackers started scanning the internet looking for vulnerable hosts to deploy threats like crypto currency miners and ransom ware on vulnerable systems. Thus, it becomes imperative for the cybersecurity defense strategy to detect threats and their capabilities as early (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. AI-Driven Threat Detection in Multi-Cloud Environments: A Proactive Security Approach.Afreen Sajida Siddique Samar Nilesh Dasgupta - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (1):4142-4145.
    The proliferation of multi-cloud architectures has introduced significant complexities in cyber security, necessitating advanced solutions to safeguard distributed infrastructures. Traditional security models often fall short in addressing the dynamic and heterogeneous nature of multi-cloud environments. Artificial Intelligence (AI) has emerged as a transformative force in enhancing threat detection capabilities, offering proactive and adaptive security measures. This paper explores the integration of AI - driven threat detection systems within multi-cloud frameworks, emphasizing their role in identifying and mitigating (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Cloudguard: Fortress Security in the Digital World.Padidala Pradeep Rao Chengali Ramakrishna Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, an advanced security framework designed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Securing the Digital Frontier: Pega’s Innovations in Cybersecurity and Regulatory Compliance.Munnangi Sivasatyanarayanareddy - 2020 - Neuroquantology 18 (11):1251-1255.
    In an era of unprecedented digital transformation, safeguarding business operations against cyber threats while adhering to stringent regulatory standards is of paramount importance. Pega, a leader in business process automation and customer engagement solutions, has significantly strengthened its platform to tackle the dual challenges of cybersecurity and regulatory compliance. This article explores Pega’s innovative approach to security and compliance, detailing how the platform has integrated cutting-edge security measures such as real-time threat detection, secure data handling, and compliance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Mitigating Cyber Threats and Protecting Data Privacy.Baladari Venkata - 2020 - Journal of Scientific and Engineering Research 7 (8):279-288.
    The rapid growth of digital technologies has heightened cybersecurity and data protection issues, putting individuals and organizations at risk of surveillance, cyber-attacks, and data misuse. The collection of large amounts of data by governments and companies has sparked worries about ethics and the law and cyberattacks such as ransomware and significant data theft incidents demonstrate major security weaknesses. This paper examines the nexus of cybersecurity and privacy, specifically investigating state-sponsored espionage, algorithmic data profiling, and regulatory frameworks. The analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Access Control Frameworks for Secure Hybrid Cloud Deployments.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-7.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, a novel hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  33. Zero Trust Security Architecture: A Paradigm Shift in Data Protection and Access Control.Baladari Venkata - 2023 - European Journal of Advances in Engineering and Technology 10 (6):87-94.
    A contemporary cybersecurity strategy known as the Zero Trust Security Model aims to eradicate implicit trust and ensure uninterrupted authentication for every user, device, and application. Zero Trust security models diverge from conventional perimeter-based security by anticipating threats within and beyond the network, necessitating rigorous authentication and limitations on user access privileges. Components like Multi-Factor Authentication (MFA), Zero Trust Network Access (ZTNA), micro-segmentation, and AI-driven threat detection strengthen security by reducing vulnerabilities and stopping unauthorized access. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Layered App Security Architecture for Protecting Sensitive Data.Tambi Varun Kumar - 2016 - International Journal of Research in Electronics and Computer Engineering 4 (3):1-15.
    As applications increasingly handle sensitive and personal information, ensuring the security of this data has become a critical concern across industries such as finance, healthcare, and e-commerce. Traditional security mechanisms that rely on single-point protection models are no longer sufficient to mitigate the growing complexity and frequency of cyber threats. This paper presents a comprehensive Layered App Security Architecture aimed at safeguarding sensitive data through a multi-tiered defense approach. The proposed framework incorporates security controls at (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Automating Network Security with Ansible: A Guide to Secure Network Automation.Bellamkonda Srikanth - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 6 (9):2722-2730.
    The increasing complexity of modern networks has amplified the challenges associated with ensuring robust and scalable security. With the rapid evolution of cyber threats, traditional methods of network security management are often inadequate, leading to inefficiencies and vulnerabilities. Automation has emerged as a transformative approach to streamline network operations, enhance security postures, and reduce the margin of human error. This study explores the integration of Ansible, a powerful open-source automation tool, into network security workflows to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Real-Time Cyber Threat Detection and Response System.P. Abirami V. Phanikumar, V. Venkata Nani, V. Premkumar, Y. Nithish Naidu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The Real-Time Cyber Threat Detection and Response System is an intelligent security framework designed to proactively identify, analyze, and respond to cyber threats in real time. With the growing sophistication of cyberattacks targeting critical infrastructure, traditional static defense mechanisms are no longer sufficient. This system addresses that gap by leveraging machine learning algorithms and dimensionality reduction techniques such as Principal Component Analysis (PCA) to enable accurate and efficient threat detection. The system captures input data, such as network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):7-12.
    Hybrid cloud environments combine private and public cloud infrastructures to optimize security, scalability, and cost-effectiveness. However, ensuring secure access control in such environments remains a critical challenge due to dynamic workloads, multi-tenancy, and cross-cloud authentication complexities. This paper explores access control models tailored for secure hybrid cloud deployment, focusing on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and emerging Zero Trust principles. We analyze their effectiveness in mitigating unauthorized access, privilege escalation, and insider threats. Additionally, a novel hybrid (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  38. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information (...) governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 largest for-profit United States headquartered corporations. The results of the multiple linear regression indicated the model was able to significantly predict ISG effectiveness, F(5, 89) = 3.08, p = 0.01, R² = 0.15. Strategic alignment was the only statistically significant (t = 2.401, p <= 0.018) predictor. The implications for positive social change include the potential to constructively understand the correlates of ISG effectiveness, thus increasing the propensity for consumer trust and reducing consumers' costs. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Next-Generation Mobile Banking Security: Federated Machine Learning and Post-Quantum Cryptographic Integration for Real-Time Threat Mitigation.Mbamara Francis Chidi - 2023 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 6 (2):307-315.
    The exponential growth of mobile banking has redefined global financial accessibility while simultaneously escalating the sophistication of cyber threats. This study presents a robust, multi-layered cybersecurity framework tailored to the evolving needs of mobile financial systems. The framework integrates three pioneering components: (1) Federated Artificial Intelligence (AI) for privacy-preserving, cross-institutional fraud detection; (2) Post-Quantum Cryptography (PQC) for long-term data integrity against emerging quantum computing threats; and (3) Adaptive Multi-Factor Authentication (A-MFA) leveraging behavioral biometrics for context-aware user verification. Experimental results, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Decentralized AI for Secure IoT: Federated Learning Meets Intrusion Detection.Sinha Krish Prem - 2019 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 6 (8):1634-1639.
    The proliferation of Internet of Things (IoT) devices has significantly expanded the attack surface for cyber threats, necessitating robust security measures. Traditional Intrusion Detection Systems (IDS) often rely on centralized architectures, which can compromise data privacy and scalability. This paper explores the integration of Federated Learning (FL) into IDS for IoT networks, enabling decentralized model training while preserving data privacy. By leveraging local computation and aggregating model updates, FL facilitates collaborative learning across distributed IoT devices. The proposed approach (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. AI-powered phishing detection: Integrating natural language processing and deep learning for email security.Saswata Dey - 2023 - World Journal of Advanced Engineering Technology and Sciences 2023 (10(02)):394-415.
    Phishing attacks are major threats to email security and pose challenges, while cyber attackers utilize increasingly sophisticated means to deceive the user and steal away important information. Well-established ways of detecting phishing attacks, such as rule-based systems or simple machine-learning models, usually cannot deal efficiently with such advanced threats. This research proposes an approach to detect phishing attacks on email systems, which deploys natural language processing and deep learning technologies. The method proposes to improve the detection accuracies and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Transforming Pension Service Request Processing with Secure, Scalable, and AI-Powered Azure Cloud Technologies.Akshay Sharma & Satish Kabade - 2024 - International Journal of Scientific Research in Science, Engineering and Technology 11 (1).
    Pension service institutions are quickly going digital as they cope with increased service requirements, the demands of regulatory compliance, and challenges posed by cybersecurity. Legacy pension management systems usually have limited scope, are inefficient, and do not provide security on-premise infrastructure (Gartner, 2023). These aspects result in inefficiencies that create delays in processing pensions, an increase in the risk of fraud, and escalated operational costs (Ponemon Institute, 2023). The most critical aspect regarding pension transactions involves the secure, efficient, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. An Investigation into the Nature, Causes and Effects of Cyber Crime on World Economy: Implication for Computer Education.Chinelo Rose-Keziah Ikemelu - 2015 - Journal of Science Education 12 (1):197-209.
    The study investigated the nature, causes, and effects of cybercrime on the world economy: Implication for computer Education. Descriptive Survey designs were adopted and carried out at Nwafor Orizu College of Education Nsugbe. Three hundred and thirty-five (335) students formed the population of the study that was randomly selected from population of six hundred (600) students in the institution. The questionnaire that elicited data on the study was developed by the researcher, duly validated. The reliability of the instrument was tested (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Best Practices for Implementing Robust Security Measures.Munnangi Sivasatyanarayanareddy - 2019 - Turkish Journal of Computer and Mathematics Education 10 (2):2032-2037.
    In today’s digital landscape, organizations leveraging Pega Business Process Management (BPM) face significant security challenges as they strive to protect sensitive business processes from evolving cyber threats. This article explores best practices for implementing robust security measures within Pega BPM environments, focusing on secure configuration settings, identity and access management (IAM), encryption standards, and real-time monitoring. By integrating Pega BPM with broader cybersecurity frameworks, organizations can proactively detect and mitigate vulnerabilities, ensuring the integrity and confidentiality of critical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey.Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  47. Unraveling the 2024 CrowdStrike Incident: How a Security Patch Led to Global System Failure and Blue Screen of Death.Baladari Venkata - 2025 - International Journal of Advanced Research in Science, Communication and Technology 5 (8):171-177.
    The 2024 CrowdStrike Cybersecurity incident resulted in a worldwide IT disruption impacting millions of Microsoft Windows systems. In July 2024, a faulty update of CrowdStrike’s Falcon Endpoint Detection and Response (EDR) software caused widespread system crashes known as the “Blue Screen of Death” (BSOD). The event caused severe disruptions to major industries such as aviation, financial services, healthcare and emergency response systems resulting in operational shutdown, financial setbacks and global safety concerns. This study presents a detailed examination of the CrowdStrike (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Future-Proofing Healthcare: The Role of AI and Blockchain in Data Security.Nushra Tul Zannat Sabira Arefin - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (3):1445-1462.
    The heightened digitization of the healthcare industry has led to an exponential increase in sensitive patient data, which requires robust security models to prevent breaches, unauthorized access, and cyber attacks. Traditional security protocols are inadequate, and this has made it imperative to explore Artificial Intelligence (AI) and Blockchain as novel solutions. AI enhances healthcare cybersecurity by facilitating real-time anomaly detection, predictive analysis, and automated threat response, while blockchain offers decentralization, immutability, and secure data sharing. However, blockchain technology (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Federated Learning for Smart Device Security: A Next-Gen Intrusion Detection Paradigm.Chauhan Aditya Raj - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (5).
    The increasing number of smart devices in the Internet of Things (IoT) has led to a surge in cyber- attacks, posing significant security risks to personal and industrial systems. Traditional centralized intrusion detection systems (IDS) often face challenges related to privacy, scalability, and the heterogeneity of data generated by smart devices. This paper introduces a novel approach, Federated Learning (FL) for smart device security, to address these challenges. By utilizing FL, multiple smart devices can collaboratively learn a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Edge Computing and Its Role in Strengthening Cloud Security.Thakur Siddharth Ravi - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (5).
    As the adoption of cloud computing continues to grow, so do the concerns about the security of sensitive data and applications. Cloud environments are often seen as vulnerable to cyber-attacks due to their centralized nature and exposure to the internet. Edge computing, a distributed computing paradigm that brings computation and data storage closer to the data source, is emerging as a solution to enhance cloud security. By processing data closer to the edge of the network, edge computing (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 991