Enhancing Access Control, Authorization, and Accountability in Cyber-Physical Systems Using Machine Learning DOI

Isaac Adom,

Muhammad Awais,

Mohsin Raza

et al.

Published: Dec. 9, 2024

Language: Английский

Detection and prevention of spear phishing attacks: A comprehensive survey DOI

Santosh Kumar Birthriya,

Priyanka Ahlawat, Ankit Kumar Jain

et al.

Computers & Security, Journal Year: 2025, Volume and Issue: 151, P. 104317 - 104317

Published: Jan. 6, 2025

Language: Английский

Citations

1

Examining the Role of Artificial Intelligence in Cyber Security (CS): A Systematic Review for Preventing Prospective Solutions in Financial Transactions DOI Creative Commons

Mahfujur Rahman Faraji,

Fisan Shikder,

Md. Hasibul Hasan

et al.

International Journal of Religion, Journal Year: 2024, Volume and Issue: 5(10), P. 4766 - 4782

Published: July 26, 2024

Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate repetitive tasks, accelerate threat detection and response, improve the accuracy of their actions to strengthen security posture against various issues cyberattacks. This objective focuses on analysing how AI-based cyber (CS) solutions performance in financial transactions banking sectors. It also aims identify latest advancements AI-driven CS) research enhance operational efficiency sector. article presents systematic literature review detailed analysis AI use cases for transactions. The resulted 800 studies, which 225 articles remain. paper will provide readers with comprehensive overview potential identifies future opportunities examining application areas, advanced methods, data representation, development new infrastructures successful adoption might increase systems’ by increasing defence approaches machine learning deep learning, fraud detection, this makes sure secure safe transaction. study make safer security. highlights vital role evaluation continuous adaptation AI. In near future, topic should focus more collaboration among AI, security, system developers better secured outcomes.

Language: Английский

Citations

5

Kajian Normatif terhadap Efektivitas Peraturan Perlindungan Anak dalam Penanggulangan Eksploitasi Anak di Dunia Maya DOI Open Access

Devi Zakiyatus Solihah,

Kholifah Nyawiji,

Fera

et al.

Perkara., Journal Year: 2025, Volume and Issue: 2(4), P. 603 - 614

Published: Jan. 5, 2025

The rapid advancement of digital technology has posed significant challenges, particularly concerning the protection children from online exploitation. This study examines effectiveness child regulations in Indonesia, addressing critical issues increasing cases exploitation cyberspace. research aims to evaluate regulatory framework's strengths and limitations while providing actionable recommendations enhance system's efficiency. A normative approach was employed, incorporating content analysis relevant legal documents, comparative law with international regulations, secondary data government reports scholarly literature. revealed a consistent increase reported exploitation, limited progress resolving these cases. Despite existing systemic such as low literacy, weak inter-agency coordination, inadequate resources significantly hinder their implementation. Additionally, Indonesia lags behind developed nations adopting modern technologies, artificial intelligence, for early detection findings emphasize urgent need strategic investments literacy programs, enhanced enforcement capabilities, integration advanced technologies into mechanisms. Furthermore, this highlights role collaboration cross-border implications extend policymakers, practitioners, developers, offering comprehensive perspective on strengthening age. contributes theoretical discourse offers practical solutions developing more robust policies beyond. Future studies are encouraged explore longitudinal impacts partnerships mitigating

Language: Английский

Citations

0

Cybersecurity in Local Governments: A Systematic Review and Framework of Key Challenges DOI Creative Commons

Sk Tahsin Hossain,

Tan Yiğitcanlar, Kien Nguyen

et al.

Urban Governance, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 1, 2025

Language: Английский

Citations

0

Real-Time Data Governance and Compliance in Cloud-Native Robotics Systems DOI

Onyinye Obioha-Val,

Oluwatosin Selesi-Aina,

Titilayo Modupe Kolade

et al.

SSRN Electronic Journal, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 1, 2025

This study investigates the frameworks and challenges of real-time data governance compliance in cloud-native robotics systems, focusing on integrity, cloud security, regulatory adherence, cybersecurity risks. Using extensive datasets from Amazon AWS Open Data Registry, EU GDPR Enforcement Tracker, Kaggle's IoT dataset, analysis explores systems' accuracy, governance. were extracted through a standardized process: performance metrics, including latency error rates, gathered to assess system efficiency, violation records analyzed Tracker understand trends, volume metrics dataset correlated identify challenges. Together, these sources provide comprehensive insights into how systems can be optimized for realtime operations. The highlights security benefits advantages inherent frameworks, such as monitoring, automated threat detection, encryption, which collectively reduce unauthorized access risks while supporting operational efficiency. Findings indicate high accuracy (0.51% rate) low (mean 48.96 ms) across systems; however, processing time variability (standard deviation 28.61 signals need further optimization time-sensitive environments. regression violations reveals substantial penalty increase €53,789.41 per violation, emphasizing financial non-compliance. Correlation (r = 0.083 failures) suggests that external threats have greater impact than internal underscoring importance adaptive support both integrity systems.

Language: Английский

Citations

0

Comparative Analysis of EU-Based Cybersecurity Skills Frameworks DOI Creative Commons
Fernando Almeida

Computers & Security, Journal Year: 2025, Volume and Issue: unknown, P. 104329 - 104329

Published: Jan. 1, 2025

Language: Английский

Citations

0

Building security and resilience: a guide to implementing effective cybersecurity and data protection measures in smart cities DOI
Martin Lněnička,

Tomas Kysela,

Oldřich Horák

et al.

Smart and Sustainable Built Environment, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 3, 2025

Purpose As cities increasingly embrace smart technologies to enhance efficiency, sustainability and quality of life, integrating cybersecurity data protection measures becomes paramount. This paper analyzes practices based on the existing strategies projects in cities. Design/methodology/approach A research methodology involving searching for resources, content analysis Delphi method was developed select sample cities, identify relevant analyze categorize their content, validate relevance transform them into a list recommendations. Findings The findings include validated 39 recommendations categorized 6 categories implementing robust We found that employ various address protection, including technical solutions, organizational practices, policies human resources initiatives. economy governance components are prioritized regarding measures, while living environments receive less attention than others. There regional differences implementation with Asia Europe demonstrating higher levels engagement. Originality/value provides an approach different contexts gather best practices. identified contribute building sustainable resilient urban governance.

Language: Английский

Citations

0

Risk management in smart cities: influence analysis using DEMATEL DOI

Adalberto Freitas,

Carlos Rafael Silva de Oliveira, Pedro Fernandes de Oliveira Gomes

et al.

Environmental Hazards, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 27

Published: March 6, 2025

Language: Английский

Citations

0

From Security Frameworks to Sustainable Municipal Cybersecurity Capabilities DOI Creative Commons
Arnstein Vestad, Bian Yang

Journal of Cybersecurity and Privacy, Journal Year: 2025, Volume and Issue: 5(2), P. 19 - 19

Published: April 28, 2025

While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these must be implemented in by people necessary skills knowledge supported effective technological solutions. This article explores challenges opportunities of building sustainable cybersecurity capabilities resource-constrained organizations, specifically Norwegian municipalities. The research introduces concept capabilities, emphasizing importance a socio-technical approach that integrates technology, people, organizational structure. A mixed-methods study was employed, combining document analysis relevant modified Delphi semi-structured interviews municipal practitioners. Findings highlight six core within municipalities, along key implementing sustaining capabilities. These include ambiguities role formalization, gaps, difficulties deploying advanced technologies, communication barriers between central IT functional areas. Furthermore, potential artificial intelligence cooperative strategies to enhance is considered. Ultimately, highlights need holistic perspective developing offering implications both practice municipalities local government.

Language: Английский

Citations

0

A Country Risk Assessment from the Perspective of Cybersecurity in Local Entities DOI Creative Commons
Javier Sánchez-Zurdo, Jose San Martin

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(24), P. 12036 - 12036

Published: Dec. 23, 2024

The number of vulnerabilities identified annually has increased substantially, thereby raising the risks associated with online services. implementation cybersecurity management measures in accordance European NIS2 Directive is optional at local authority level. This study analyzes external perimeter nearly 7000 municipalities and proposes a simplified security framework that provides comprehensive view across regions. A complete data set was assembled on Technological Competence profiles all Spain over two-year period. were gathered from relation to security, availability SEO posture areas. survey conducted determine level concern among citizens regarding issues municipal services, 188 respondents. Some regions as exhibiting particularly high homogeneous levels security. In contrast, other found be below expected presence supra-local entities, such “Diputaciones”, been demonstrated facilitate harmonization regional while simultaneously reducing technological fragmentation operational expenditure.

Language: Английский

Citations

2