Results for 'cyberattack'

27 found
Order:
  1. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. AI-Driven Cybersecurity: Transforming the Prevention of Cyberattacks.Mohammed B. Karaja, Mohammed Elkahlout, Abeer A. Elsharif, Ibtesam M. Dheir, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (10):38-44.
    Abstract: As the frequency and sophistication of cyberattacks continue to rise, organizations face increasing challenges in safeguarding their digital infrastructures. Traditional cybersecurity measures often struggle to keep pace with rapidly evolving threats, creating a pressing need for more adaptive and proactive solutions. Artificial Intelligence (AI) has emerged as a transformative force in this domain, offering enhanced capabilities for detecting, analyzing, and preventing cyberattacks in real- time. This paper explores the pivotal role of AI in strengthening cybersecurity defenses by leveraging machine (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  3. Do Ambiguities in International Humanitarian Law make Cyberattacks more Advantageous?Damian Williams - forthcoming - Forthcoming.
    Does it seem that with each reported state cyberattack, there comes an announcement of discovery, an attribution to one of a handful of usual suspects, some threatening language suggesting imminent retribution, and then nothing more? Increased incidence of cyberattack makes its occurrence seem simultaneously rampant in terms of publicity and minimal in terms of threat of war. If rampant, how can repeated deployment by the same actors carry no punitive consequences? How is such audaciousness tolerated? For some, a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey.Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of the existing state-of-the-art (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  5. Home Depot Breach or The Rise of Ransomware.Vaka Pavan Reddy - 2014 - Neuroquantology 12 (4):485-491.
    The Home Depot data breach, which occurred in 2014, marked a significant turning point in the cybersecurity landscape, drawing attention to the increasing prevalence of ransomware and cyberattacks targeting large-scale retail organizations. This breach exposed the personal and financial information of over 56 million customers and highlighted the vulnerabilities in the systems used by major corporations. The attack was attributed to a sophisticated ransomware operation that gained access through a third-party vendor’s compromised credentials, ultimately enabling cybercriminals to infiltrate Home Depot’s (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  6. Recent work in the theory of conceptual engineering.Steffen Koch, Guido Löhr & Mark Pinder - 2023 - Analysis 83 (3):589-603.
    A philosopher argues that state-sponsored cyberattacks against central military or civilian targets are always acts of war. What is this philosopher doing? According to conceptual analysts, the philosopher is making a claim about our concept of war. According to philosophical realists, the philosopher is making a claim about war per se. In a quickly developing literature, a third option is being explored: the philosopher is engineering the concept of war. On this view, the philosopher is making a proposal about which (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  7. Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Cybersecurity Approaches for IoT Devices in Smart City Infrastructures.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-5.
    : The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  9. CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to identify potential (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  10. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper argues (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. AI vs Cyber Threats: Real-World Case Studies on Securing Healthcare Data.Nushra Tul Zannat Sabira Arefin - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):396-404.
    The increasing rate and sophistication of cyber attacks pose a major risk to health data security. Traditional security systems cannot handle advanced ransomware, insider threats, and phishing attacks and hence incorporation of artificial intelligence (AI) into cybersecurity solutions becomes the need of the hour. AI-based security solutions leverage machine learning, behavior analysis, and real-time anomaly detection to identify and counter threats before they affect sensitive patient information. This study examines real-world case studies where AI successfully prevented cyberattacks in healthcare settings, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Technology: Tools Shaped by Human Ingenuity.Angelito Malicse - manuscript
    Technology: Tools Shaped by Human Ingenuity -/- In the modern world, technology is an inseparable part of daily life. From smartphones and computers to advancements in artificial intelligence and space exploration, the technological landscape continues to evolve at an extraordinary pace. However, at its core, all technological inventions are simply tools—tools designed by humans to address needs, enhance capabilities, and solve problems. These tools are reflections of human creativity, intellect, and the innate drive to improve our lives. Understanding technology as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Real-Time Cyber Threat Detection and Response System.P. Abirami V. Phanikumar, V. Venkata Nani, V. Premkumar, Y. Nithish Naidu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The Real-Time Cyber Threat Detection and Response System is an intelligent security framework designed to proactively identify, analyze, and respond to cyber threats in real time. With the growing sophistication of cyberattacks targeting critical infrastructure, traditional static defense mechanisms are no longer sufficient. This system addresses that gap by leveraging machine learning algorithms and dimensionality reduction techniques such as Principal Component Analysis (PCA) to enable accurate and efficient threat detection. The system captures input data, such as network traffic or log (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Development and Deployment of a Secure Deep Learning Framework for Cyber Attack Prediction in Computer Networks.DrK. Mekala M. Dharani, A. P., P. Saikrishna, A. P., C. Sivakumar, A. P. - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4):3114-3121.
    This research develops a CNN-based deep learning model to predict cyberattacks in computer networks and compares it with an LSTM model. Materials and Methods: It considered two groups: Group 1 (LSTM) and Group 2 (CNN) of 26 samples each with a G Power of 80%, a threshold of 0.05, and a 95% confidence interval. Result: The CNN model outperformed the LSTM model in accuracy, 92.56% to 96.74%, while the LSTM model ranged between 85.42% to 91.87%. In addition, CNN had lower (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the proposed approach (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Classification of Dark Web Using Text Based CNN and Topic Weight Model.Karuturi Eeshika Burle Sudharani - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    It is difficult to monitor its users, the Dark Web, an online domain that guarantees user anonymity, has grown to be a hub for illicit activity and a source of information about cyberattacks. This study looked at how the Dark Web is categorised in connection with various online dangers. To identify vector types appropriate for machine learning categorisation, we analysed words from the Dark Web. Conventional techniques that build features by using all Dark Web texts produce vectors that contain every (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. AI-powered phishing detection: Integrating natural language processing and deep learning for email security.Saswata Dey - 2023 - World Journal of Advanced Engineering Technology and Sciences 2023 (10(02)):394-415.
    Phishing attacks are major threats to email security and pose challenges, while cyber attackers utilize increasingly sophisticated means to deceive the user and steal away important information. Well-established ways of detecting phishing attacks, such as rule-based systems or simple machine-learning models, usually cannot deal efficiently with such advanced threats. This research proposes an approach to detect phishing attacks on email systems, which deploys natural language processing and deep learning technologies. The method proposes to improve the detection accuracies and efficiencies of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Beyond VPNs: Advanced Security Strategies for the Remote Work Revolution.Govindarajan Lakshmikanthan Sreejith Sreekandan Nair - 2020 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (5):1283-1294.
    The global shift to remote work has greatly increased the potential targets for cyberattacks, demanding stronger security measures than what Virtual Private Networks (VPNs) can provide. VPNs provide a bottom-line layer of security but don’t address the changing complexity of the distributed world of work. In this paper, we discuss advanced security frameworks and best practices to protect data and identity in a purely remote work setting, focusing on threat mitigation. The discussed key strategies include Zero Trust Architecture (ZTA), Secure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. AI-Powered Cloud Security: Revolutionizing Cyber Defense in the Digital Age.V. Talati Dhruvitkumar - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (3):4762-4768.
    The rapid evolution of cloud computing and the increasing sophistication of cyber threats have necessitated a paradigm shift in the approach to cybersecurity. The rapid growth of cloud computing has revolutionized business operations with unparalleled scalability, flexibility, and access to enormous computational power. Nevertheless, exponential growth has also led to an exponential rise in security threats, with cloud environments being the main target for cyberattacks. Conventional security controls lag behind the rising complexity of these threats. Artificial intelligence (AI) has become (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity challenges and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Dynamic Intrusion Detection Systems Powered by Machine Learning Algorithms.Sandeep Belidhe Ashish Reddy Kumbham - 2024 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 13 (6):12405-12411.
    This remains the case because cyberattacks are becoming more frequent and sophisticated, and as a result, the IDS must also be innovative and evolving to protect sensitive networks. Traditional intrusion detection techniques are replaced by more advanced and dynamic Methodologies based on Machine Learning (ML) algorithms. These dynamic systems capture significant data flows, search for potentially pathological patterns, and forecast threats in real time. By simulating and analyzing real-time cases, this paper discusses the architecture for ML-based IDS, how this function (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. HTTPS ENFORCEMENT FOR DISTRIBUTED REST APIS FOR END-TO-END DATA PROTECTION.Baladari Venkata - 2019 - International Journal of Business Quantitative Economics and Applied Management 6 (5):20-28.
    In the modern era of distributed systems and cloud architecture, RESTful APIs have become the essential foundation of contemporary web applications, facilitating effortless data interchange across various platforms. Despite their widespread use, APIs have become prime targets for cyberattacks, underscoring the importance of implementing robust security measures. This study concentrates on implementing HTTPS in distributed REST APIs to protect against potential threats like man-in-the-middle (MITM) attacks, data breaches, and unauthorized access, thereby providing a comprehensive data security framework. This research examines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Mitigating Cyber Threats and Protecting Data Privacy.Baladari Venkata - 2020 - Journal of Scientific and Engineering Research 7 (8):279-288.
    The rapid growth of digital technologies has heightened cybersecurity and data protection issues, putting individuals and organizations at risk of surveillance, cyber-attacks, and data misuse. The collection of large amounts of data by governments and companies has sparked worries about ethics and the law and cyberattacks such as ransomware and significant data theft incidents demonstrate major security weaknesses. This paper examines the nexus of cybersecurity and privacy, specifically investigating state-sponsored espionage, algorithmic data profiling, and regulatory frameworks. The analysis investigates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Autonomy and Machine Learning as Risk Factors at the Interface of Nuclear Weapons, Computers and People.S. M. Amadae & Shahar Avin - 2019 - In Vincent Boulanin, The Impact of Artificial Intelligence on Strategic Stability and Nuclear Risk: Euro-Atlantic Perspectives. Stockholm: SIPRI. pp. 105-118.
    This article assesses how autonomy and machine learning impact the existential risk of nuclear war. It situates the problem of cyber security, which proceeds by stealth, within the larger context of nuclear deterrence, which is effective when it functions with transparency and credibility. Cyber vulnerabilities poses new weaknesses to the strategic stability provided by nuclear deterrence. This article offers best practices for the use of computer and information technologies integrated into nuclear weapons systems. Focusing on nuclear command and control, avoiding (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also (...)
    Download  
     
    Export citation  
     
    Bookmark