Neoteric Threat Intelligence Ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems DOI Open Access
Sudhakar Kumar, Sunil Kumar Singh, Rakesh Kumar

et al.

Procedia Computer Science, Journal Year: 2025, Volume and Issue: 254, P. 39 - 47

Published: Jan. 1, 2025

Language: Английский

Foundations of Phishing Defense DOI

Kanwar Raj,

S.S. Bawa,

Sunil K. Singh

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 24

Published: Feb. 14, 2025

Phishing remains a significant cybersecurity threat, targeting individuals and organizations to access confidential data. As techniques evolve, innovative protective measures are essential. This paper offers detailed overview of phishing defense strategies, focusing on both technological solutions human-centered approaches. Multi-layered defenses, blending traditional security with user education, vital for mitigating risks. Simulated exercises ongoing training empower employees recognize respond threats, strengthening the human aspect cybersecurity. Leadership commitment open communication crucial cultivating strong culture, encouraging staff report suspicious activities. Continuous evaluation updates defenses necessary adapt evolving threats. Real-world case studies, such as 2020 Twitter breach SolarWinds attack, highlight severe impacts phishing, reinforcing need proactive that combines technology, risk management protect digital assets effectively.

Language: Английский

Citations

0

Understanding Cyber Threats in Modern Space Missions DOI

Anoop Pant,

Sudhakar Kumar, Sunil K. Singh

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 29 - 60

Published: Feb. 28, 2025

The integration of blockchain technology with cryptocurrency has significantly improved security, transparency, and decentralization in digital finance. authors explore the fundamental principles its integral role development operation various cryptocurrencies. They present a comprehensive analysis blockchain's core architecture, including consensus mechanisms such as proof work (PoW) stake (PoS), examine their implications for transaction security efficiency. Through detailed case studies industry examples, study illustrates how addresses issues like double-spending fraud, thereby maintaining trust reliability financial systems. Furthermore, chapter discusses regulatory scalability challenges associated offers insights into future trends advancements. By addressing technical practical aspects technology, highlights it empowers cryptocurrency.

Language: Английский

Citations

0

Leveraging Dynamic Embeddings and Reinforcement Learning with Bayesian Networks for Ransomware Resiliences DOI Creative Commons
Sudhakar Kumar, Sunil Kumar Singh, Saket Sarin

et al.

Cyber Security and Applications, Journal Year: 2025, Volume and Issue: unknown, P. 100095 - 100095

Published: April 1, 2025

Language: Английский

Citations

0

Neoteric Threat Intelligence Ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems DOI Open Access
Sudhakar Kumar, Sunil Kumar Singh, Rakesh Kumar

et al.

Procedia Computer Science, Journal Year: 2025, Volume and Issue: 254, P. 39 - 47

Published: Jan. 1, 2025

Language: Английский

Citations

0