Results for 'Cybersecurity'

129 found
Order:
  1.  62
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  96
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  86
    AI and Cybersecurity in 2024: Navigating New Threats and Unseen Opportunities.Tripathi Praveen - 2024 - International Journal of Computer Trends and Technology 72 (8):26-32.
    In 2024, the intersection of artificial intelligence (AI) and cybersecurity presents both unprecedented challenges and significant opportunities. This article explores the evolving landscape of AI-driven cyber threats, the advancements in AI-enabled security measures, and the strategic responses required to navigate these new realities. Leveraging statistics, trends, and expert insights, we delve into how organizations can enhance their cybersecurity posture in the face of sophisticated AI threats.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  6.  42
    Cybersecurity Risk Management in the Era of Remote Work and Cloud Computing.Dhivya K. - 2025 - International Journal of Innovative Research in Science, Engineering and Technology 14 (2):1637-1641.
    The rise of remote work and the widespread adoption of cloud computing have transformed the digital landscape, providing organizations with flexibility and scalability. However, these advancements have also introduced new cybersecurity challenges. Traditional security frameworks, which focus on perimeter defenses, are increasingly inadequate in securing cloud-based environments and remote workforces. This paper explores the evolving landscape of cybersecurity risk management in the context of remote work and cloud computing. It investigates the unique risks associated with these technologies, such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  18
    Proactive Cybersecurity: Predictive Analytics and Machine Learning for Identity and Threat Management.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (12):17488-17496.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the detection of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  40
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  29
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  26
    Enhancing Cybersecurity and Privacy using Artificial Intelligence: Trends and Future Directions of Research.V. Talati Dhruvitkumar - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (1):56-64.
    The speed with which cyber threats are evolving is calling for fresh approaches to enhance cybersecurity and protection of privacy. Artificial Intelligence (AI) is proving to be a revolutionary factor in enhancing cybersecurity, providing powerful capabilities for intrusion detection, malware detection, and privacy protection. This article outlines an in-depth review of the use of AI in cybersecurity with particular reference to future directions and trends in research. Applying the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. AI-Driven Cybersecurity: Transforming the Prevention of Cyberattacks.Mohammed B. Karaja, Mohammed Elkahlout, Abeer A. Elsharif, Ibtesam M. Dheir, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (10):38-44.
    Abstract: As the frequency and sophistication of cyberattacks continue to rise, organizations face increasing challenges in safeguarding their digital infrastructures. Traditional cybersecurity measures often struggle to keep pace with rapidly evolving threats, creating a pressing need for more adaptive and proactive solutions. Artificial Intelligence (AI) has emerged as a transformative force in this domain, offering enhanced capabilities for detecting, analyzing, and preventing cyberattacks in real- time. This paper explores the pivotal role of AI in strengthening cybersecurity defenses by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  22
    Cybersecurity and Network Engineering: Bridging the Gap for Optimal Protection.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (4):2701-2706.
    : In the digital age, cybersecurity and network engineering are two integral disciplines that must operate in unison to safeguard information and ensure the resilience of modern systems. While network engineering focuses on designing, implementing, and maintaining infrastructure, cybersecurity emphasizes protecting this infrastructure and its data from threats. This research explores the intricate relationship between these domains, advocating for a unified approach to achieve optimal protection in an increasingly interconnected world. The study highlights the evolving threat landscape characterized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  70
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  58
    Cybersecurity Portal for Effective Management of Servers and Firewall.G. Balram, - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (7):1-15.
    Existing systems often lack a centralized platform for managing server and firewall operations, leading to fragmented oversight and delayed responses to cyber threats. This gap frequently results in increased vulnerabilities and operational inefficiencies within organizations. To address this issue, we propose the development of the Cybersecurity Portal, designed to provide real-time monitoring, predictive analytics, and streamlined resource allocation for server and firewall management. The portal will offer comprehensive insights into system performance, potential vulnerabilities, and proactive threat detection. By equipping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  48
    Cybersecurity Frameworks in Guidewire Environments: Building Resilience in the Face of Evolving Threats.Ravi Teja Madhala Sateesh Reddy Adavelli - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (8):12040-12049.
    The digitization process has brought new opportunities in insurance industry operations and innovations but has also revealed major weaknesses. Since more and more actual insurers use Guidewire to handle claims, policies, and customer data, insurers become targets for cyber threats that target valuable information. The framework of Guidewire, along with cloud computing integrated API and third-party tools, is laden with numerous exposure points. These security gaps are utilized to execute phishing, spread malware and gain unauthorized access to customers and operational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  37
    Cybersecurity Approaches for IoT Devices in Smart City Infrastructures.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-5.
    : The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  37
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  18.  47
    Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Response.B. Yogeshwari - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (3):2217-2223.
    The rapid evolution of cyber threats has made traditional cybersecurity methods increasingly inadequate. Artificial Intelligence (AI) has emerged as a transformative technology in the field of cybersecurity, offering enhanced capabilities for detecting and responding to cyber threats in real time. This paper explores the role of AI in revolutionizing cybersecurity, focusing on its applications in threat detection, anomaly detection, and automated response systems. Through the use of machine learning algorithms, AI can analyze vast amounts of data, identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Ethical principles shaping values-based cybersecurity decision-making.Joseph Fenech, Deborah Richards & Paul Formosa - 2024 - Computers and Society 140 (103795).
    The human factor in information systems is a large vulnerability when implementing cybersecurity, and many approaches, including technical and policy driven solutions, seek to mitigate this vulnerability. Decisions to apply technical or policy solutions must consider how an individual’s values and moral stance influence their responses to these implementations. Our research aims to evaluate how individuals prioritise different ethical principles when making cybersecurity sensitive decisions and how much perceived choice they have when doing so. Further, we sought to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  21
    Comprehensive Academic Cybersecurity during Rapid Remote Learning Migration: A Holistic Approach to Security, Privacy, and Accessibility.Lakshmikanthan Govindarajan - 2020 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (1):8-19.
    The rapid transition to remote learning during the early 2020 pandemic has catalyzed unprecedented changes in higher education cybersecurity infrastructure. This white paper presents a comprehensive framework addressing the multifaceted challenges of securing academic environments during this transformation. Our research examines not only traditional security concerns but also emerging challenges in student privacy, mental health considerations, geographical access disparities, and cross-institutional collaboration. Through empirical analysis of implementation across multiple institutions, we demonstrate how universities can adapt their security architectures to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  27
    AI-Powered Cybersecurity: Leveraging Deep Learning for Real-Time Threat Detection in Financial Services.Tripathi Praveen - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (8):10540-10542.
    The rise in cyber threats targeting financial institutions has led to the adoption of artificial intelligence (AI) and deep learning models to mitigate risks and detect fraud in real-time. This paper explores AI-powered cybersecurity frameworks that enhance fraud detection, risk analytics, and compliance automation in financial transactions.
    Download  
     
    Export citation  
     
    Bookmark  
  22.  75
    Design of Cybersecurity Smart Controller For Grid Connected Microgrid.Soma Abhiram - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-15.
    The research introduces to the design and implementation of the Cybersecurity Enabled Smart Controller for the grid connected microgrid which uses the combination of the Web technologies and the authentication mechanism which enables real time monitoring with help of the Dashboards built using Chart.js which is a framework of JavaScript. Due to the role and connection of the Microgrids with the critical infrastructure they are vulnerable to the cyber threats. This project leverages the use of HTML, CSS, JavaScript and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity.Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato & Luciano Floridi - 2024 - Computer Law and Security Review 55.
    The complexity and emergent autonomy of Generative AI systems introduce challenges in predictability and legal compliance. This paper analyses some of the legal and regulatory implications of such challenges in the European Union context, focusing on four areas: liability, privacy, intellectual property, and cybersecurity. It examines the adequacy of the existing and proposed EU legislation, including the Artificial Intelligence Act (AIA), in addressing the challenges posed by Generative AI in general and LLMs in particular. The paper identifies potential gaps (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  24. Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  62
    The Future of Cybersecurity: Emerging Threats and Mitigation Strategies.Swapna V. Sneha P. - 2021 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 8 (12):1306-1312.
    As technology rapidly advances, the landscape of cybersecurity faces increasingly complex and evolving threats. This paper explores the future of cybersecurity, focusing on emerging threats and the corresponding mitigation strategies. Key threats include AI-driven attacks, ransomware evolution, quantum computing vulnerabilities, IoT security risks, cloud security challenges, and supply chain attacks. These threats have the potential to disrupt organizations and compromise sensitive data on an unprecedented scale. To address these challenges, the paper outlines effective mitigation strategies such as leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  19
    The Great Resignation: Managing Cybersecurity Risks during Workforce Transitions.Govindarajan Lakshmikanthan Sreejith Sreekandan Nair - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (7):1551-1563.
    Where organizations used to rely on employees tenured with their company, the Great Resignation has presented new problems to organizational structure and fortification. Such a process usually leads to disrupted employee productivity and most importantly, increased vulnerability to cyber threats. Loyal workers, intentionally or unintentionally disloyal workers, and employees who leave the organization can compromise organizational confidential information, such as innovation, customer data, and other data that the organization considers to be highly valuable. Research has also revealed that workforce transition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  68
    Integrating Ensemble _Deep Learning Models for Cybersecurity in Cloud Network Forensics (12th edition).B. Menaka Dr S. Arulselvarani, - 2024 - International Journal of Multidisciplinary and Scientific Emerging Research 12 (4):2653-2606. Translated by Dr. S. Arulselvarani.
    To evaluate the effectiveness of our approach to enhancing cloud computing network forensics by integrating deep learning techniques with cybersecurity policies. With the increasing complexity and volume of cyber threats targeting cloud environments, traditional forensic methods are becoming inadequate. Deep learning techniques offer promising solutions for analyzing vast amounts of network data and detecting anomalies indicative of security breaches. By integrating deep learning models with cybersecurity policies, organizations can achieve enhanced threat detection, rapid response times, and improved overall (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  71
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  30.  61
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  42
    The Ethics of Cybersecurity: Balancing Privacy and Protection in the Digital Age.Lokhande Tina Kishor - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 12 (2):490-494.
    The increasing integration of digital technologies into every aspect of modern life has led to a growing concern over cybersecurity, particularly in the context of privacy. As organizations collect vast amounts of personal and sensitive data, the tension between securing this information and preserving individual privacy has become a critical ethical dilemma. This paper explores the ethical challenges faced by cybersecurity professionals, policymakers, and organizations when balancing the need for protection against the potential risks to personal privacy. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  25
    The Role of Zero Trust Architecture in Mitigating Emerging Cybersecurity Threats.Alugoju Narasimha Rao - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (12):20200-20208.
    The rapid growth of cloud computing has revolutionized data management, providing organizations with unmatched scalability and flexibility [1]. However, this digital transformation has also exposed critical vulnerabilities, especially in the face of increasingly sophisticated cyber threats [3]. As organizations migrate to cloud-based infrastructures, traditional security models are proving ineffective in safeguarding sensitive data. Zero Trust Architecture (ZTA) emerges as a proactive and robust security framework designed to address these challenges by enforcing strict access controls and verifying every request for access, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  20
    Ethical and Legal Issues of AI-based Health Cybersecurity.V. Talati Dhruvitkumar - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (2):1112-1120.
    The application of Artificial Intelligence (AI) to health cybersecurity has led to a new era of opportunities and challenges. AI improves threat detection and mitigation but evokes concerns about data privacy, informed consent, algorithmic bias, and regulatory compliance. This article summarizes these vital issues by examining current challenges and suggesting ethical and legal frameworks to counter risks. Primary areas of emphasis are on lessening data, anonymizing data, minimizing bias, altering regulation, and facilitating international cooperation. The study needs to come (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  30
    Zero Trust Architecture: A Key Component of Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-208.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  19
    Securing the Distributed Workforce: A Framework for Enterprise Cybersecurity in the Post-COVID Era.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2022 - International Journal of Advanced Research in Education and Technology 9 (2):594-602.
    COVID-19 is the new standard for forced changes in the workforce, forcing the adoption of remote and hybrid work environments globally. It was in the period of this rapid adoption of distributed work environments that new opportunities for flexibility and productivity were opened up, but fundamental weaknesses of conventional notions of cybersecurity were unveiled. As employees connect to company networks from a plethora of different places and different types of devices, situations were complex at the corporate level to ensure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  58
    Future Proofing Insurance Operations: A Guidewire-Centric Approach to Cloud, Cybersecurity, and Generative AI.Adavelli Sateesh Reddy - 2023 - International Journal of Computer Science and Information Technology Research 4 (2):29-52.
    By integration with cloud computing, cybersecurity and generative AI, the insurance industry is being transformed from high efficiency, low cost, and better customer service. However, these advanced technologies can also be used by insurers to automate and streamline processes like claims handling, underwriting, and policy generation, which are majorly time consuming and error prone. In predictive analytics, fraud detection, and personalized customer experience, generative AI makes it possible for insurers to mitigate risks and, at the same time, provide more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  56
    Building Resilient Digital Insurance Ecosystems: Guidewire, Cloud, And Cybersecurity Strategies.Adavelli Sateesh Reddy - 2022 - Esp Journal of Engineering and Technology Advancements 2 (3):140-153.
    Through a combination of Guidewire platforms, cloud computing and cybersecurity frameworks, the insurance industry in miniature is being transformed into a digitally transformed, ever resilient ecosystem. This ecosystem enables insurers to modernize core operations of policy management, claims processing and billing while continuing to provide secure, scalable and efficient service delivery. Insurers using cloud infrastructure have elastic resources capable of scaling to meet dynamic workloads and can provide high availability and fast disaster recovery. They have liberated data analytics to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  24
    AI Security: A Unified Risk Governance Framework for Cybersecurity Compliance.Tripathi Praveen - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (4):1691-1693.
    Cloud security remains a top concern for enterprises. This study introduces AI Security, a risk governance framework integrating AI, DevSecOps, and predictive analytics to enhance compliance automation and threat intelligence in cloud environments.
    Download  
     
    Export citation  
     
    Bookmark  
  41. A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  66
    The Role of Zero Trust Architecture in Modern Cybersecurity Frameworks.Sharma Sidharth - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):202-203.
    The increasing complexity and sophistication of cyber threats have rendered traditional perimeter-based security models insufficient for protecting modern digital infrastructures. Zero Trust Architecture (ZTA) has emerged as a transformative cybersecurity framework that operates on the principle of "never trust, always verify." Unlike conventional security models that rely on implicit trust, ZTA enforces strict identity verification, continuous monitoring, least-privilege access, and microsegmentation to mitigate risks associated with unauthorized access and lateral movement of threats. By integrating technologies such as artificial intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  38
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. Key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  25
    Survey of Artificial Intelligence Applications In Cybersecurity.Harsh Khandve Sonu Velgekar - 2021 - International Journal of Innovative Research in Science, Engineering and Technology 10 (5):4289-4296.
    Artificial intelligence refers to the idea of programming computers to have human-like intelligence and the ability to imitate human behaviour. Machines show characteristics correlated with the human mind, such as learning and problem-solving. The current security systems are slow and insufficient. Artificial intelligence may aid in the improvement of these factors, as well as the detection rate of intrusion detection and prevention systems (IDPS).With the successful use of AI, the system would be more efficient and fast but this also brings (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in books, scientific (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for extremely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  57
    Future-Proofing Healthcare: The Role of AI and Blockchain in Data Security.Nushra Tul Zannat Sabira Arefin - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (3):1445-1462.
    The heightened digitization of the healthcare industry has led to an exponential increase in sensitive patient data, which requires robust security models to prevent breaches, unauthorized access, and cyber attacks. Traditional security protocols are inadequate, and this has made it imperative to explore Artificial Intelligence (AI) and Blockchain as novel solutions. AI enhances healthcare cybersecurity by facilitating real-time anomaly detection, predictive analysis, and automated threat response, while blockchain offers decentralization, immutability, and secure data sharing. However, blockchain technology faces major (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Older adults' safety and security online: A post-pandemic exploration of attitudes and behaviors.Edgar Pacheco - 2024 - Journal of Digital Media and Interaction 7 (17):107-126.
    Older adults’ growing use of the internet and related technologies, further accelerated by the COVID-19 pandemic, has prompted not only a critical examination of their behaviors and attitudes about online threats but also a greater understanding of the roles of specific characteristics within this population group. Based on survey data and using descriptive and inferential statistics, this empirical study delves into this matter. The behaviors and attitudes of a group of older adults aged 60 years and older (n=275) regarding different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  25
    Beyond The Cloud: Mastering Security in the Digital Age.Rupali Sharma Omkar C. Patil, Yash D. Patil - 2025 - International Journal of Advanced Research in Education and Technology 12 (1):240-247.
    As digital transformation accelerates, organizations are increasingly reliant on cloud-based services for flexibility, scalability, and cost-efficiency. However, the proliferation of cloud technologies has introduced new, sophisticated cybersecurity challenges. The traditional perimeter-based security model is no longer sufficient in safeguarding critical data and applications. This paper explores the evolving landscape of cybersecurity in the context of cloud computing and presents strategies for mastering security in the digital age. We discuss the importance of securing cloud-native applications, the role of advanced (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 129