Abstract

In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace.  Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.

Keywords

  • Cyber Security
  • Cyber Attacks
  • Phishing
  • Cyber Crime
  • Network Security
  • Internet of Things (IoT) Security
  • Cyber Security Frameworks
  • Malware.

References

  1. Barry M. Leiner at. al., “A Brief History of the Internet,” ACM SIGCOMM Computer Communication Review, Volume 39, Number 5, October 2009
  2. M. Gallaher, A. Link and B. Rowe, Cyber Security: Economic Strategies and Public Policy Alternatives, Edward Elgar Publishing, 2008
  3. T. Rid and B. Buchanan, "Attributing cyber-attacks", Journal of Strate St., vol. 38, no. 1-2, pp. 4-37, 2015
  4. B. Zhu, A. Joseph and S. Sastry, "A taxonomy of cyber-attacks on SCADA systems", 2011 International conference on internet of things and 4th international conference on cyber physical and social computing, pp. 380-388, 2011
  5. Lillian Ablon, Martin C. Libicki and Andrea A. Golay, Markets for Cybercnme Tools and Stolen Data: Hackers’ Bazaar, pp. 1-85, 2014
  6. Dawson, J. and Thomson, R., “The future cybersecurity workforce: Going beyond technical skills for successful cyber performance”, Frontiers in Psychology, 9(JUN), pp. 1–12, 2018, doi: 10.3389/fpsyg.2018.0074
  7. C. L. Philip, Q. Chen and C. Y. Zhang, "Data-intensive applications challenges techniques and technologies: A survey on big data", Information Sciences, vol. 275, pp. 314-347, 2014
  8. Yusuf Perwej, “An Experiential Study of the Big Data”, International Transaction of Electrical and Computer Engineers System (ITECES), USA, ISSN (Print): 2373-1273 ISSN (Online): 2373-1281, Science and Education Publishing, Volume 4, No. 1, Pages 14-25, 2017, DOI: 10.12691/iteces-4-1-3
  9. Yusuf Perwej ,“ The Hadoop Security in Big Data: A Technological Viewpoint and Analysis ”, International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE) , E-ISSN: 2320-7639, Volume 7, Issue 3, Pages 1- 14, June 2019, DOI: 10.26438/ijsrcse/v7i3.1014
  10. Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop Technology”, International Transaction of Electrical and Computer Engineers System (ITECES), USA, Volume 4, No. 1, Pages 26-38, 2017 , DOI: 10.12691/iteces-4-1-4
  11. Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), ISSN : 2248-9622, Volume 8, Issue 1, ( Part -I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
  12. Cagri B Aslan, Rahime Belen Saglam and Shujun Li, "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example", SMSociety, July 2018.
  13. Igor Skrjanc, Seiichi Ozawa, Tao Ban and Dejan Dovzan, "Large-scale cyber-attacks monitoring using Evolving CauchyPossibilistic Clustering" in Applied Soft Computing, Elsevier, vol. 62, pp. 592-601, 2018
  14. Praveen Paliwal, "Cyber Crime", Nations Congress on the Prevention of Crime and Treatment of Offenders, March 2016
  15. M. Kjaerland, "A taxonomy and comparison of computer security incidents from the commercial and government sectors", Comput. Secur., vol. 25, no. 7, pp. 522-538, 200
  16. M. A. Faysel and S. S. Haque, "Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems", IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 10, no. 7, 2010
  17. Le Compte, D. Elizondo and T. Watson, "A renewed approach to serious games for cyber security", 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, pp. 203-216, 2015
  18. N. Virvilis, A. Mylonas, N. Tsalis and D. Gritzalis, "Security Busters: Web browser security vs. rogue sites", Comput. Secur., vol. 52, pp. 90-105, 2015
  19. P. Chen, L. Desmet and C. Huygens, "A study on advanced persistent threats" in Communications and Multimedia Security, Springer, pp. 63-72, 2014
  20. Yusuf Perwej, “An Evaluation of Deep Learning Miniature Concerning in Soft Computing”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN Volume 4, Issue 2, Pages 10 - 16, February 2015 DOI: 10.17148/IJARCCE.2015.4203
  21. B. M. Thuraisingham, "Can AI be for Good in the Midst of Security Attacks and Privacy Violations?", Proceedings ACM CODASPY, 2020
  22. Yusuf Perwej , “Recurrent Neural Network Method in Arabic Words Recognition System”, International Journal of Computer Science and Telecommunications (IJCST), Sysbase Solution (Ltd), UK, London, ISSN 2047-3338, Volume 3, Issue 11, Pages 43-48, November 2012.
  23. Brenner SW. Cybercrime metrics: old wine, new bottles? Va. JL & Tech, 9:13–13, 2004
  24. Kshetri N. The simple economics of cybercrimes, IEEE Secur Priv, 4, pp. 33–39, 2006
  25. Maloof, M. A. (Ed.), Machine learning and data mining for computer security: methods and applications. Springer Science Business Media, 2006
  26. M. Cross and D. L. Shinder, Scene of the cybercrime.Syngress Pub., 2008
  27. N. Dhanjani, B. Rios, and B. Hardin, Hacking: The Next Generation: The Next Generation. O’Reilly Media, Inc., 2009
  28. Y Perwej, K Haq, U Jaleel, F Parwej, “Block ciphering in KSA, A major breakthrough in cryptography analysis in wireless networks”, International Transactions in Mathematical Sciences and Computer, India, ISSN-0974-5068, Volume 2, No. 2, Pages 369-385, July-December 2009
  29. Fink, E., Sharifi, M., & Carbonell, J. G. “Application of machine learning and crowdsourcing to detection of cybersecurity threats”, In Proceedings of the US Department of Homeland Security Science Conference–Fifth Annual University Network Summit, Washington, DC., 2011
  30. Greenfield VA, Pa. L. A framework to assess the harm of crim. Br J Crimi., vol. 53, pp. 864–885, 2013
  31. T. Grant and S. Liles, On the military geography of cyberspace,'' Proc. Int. Conf. Inf. Warfa, p. 66, 2014
  32. M. Chertoff and P. Rosenzweig. (Mar. 1, 2015). A Primer on Globally Harmonizing Internet Jurisdiction and Regulations, accessed on oct. 15, 2015.
  33. Mathieu, T. & Guy, P., “A Framework for Guiding and Evaluating Literature reviews”, Communications of the Association for Inf. System, 37(6), pp 6, 2015
  34. H. Lin. (May 15, 2015). Thinking About Nuclear and Cyber Con_ict: Same Questions, Different Answers, accessed on Oct. 15, 2015.
  35. Hernández, A., Sanchez, V., Sánchez, G., Pérez, H., Olivares, J., Toscano, K., & Martinez, V. (2016, March). Security attack prediction based on user sentiment analysis of Twitter data. In 2016 IEEE international conference on industrial technology (ICIT) (pp. 610-617). IEEE.
  36. Edwards B, Hofmeyr S, Forrest S. Hype and heavy tails: a closer look at data breaches. J Cyber secur 2016;2:3–14
  37. Buczak, A. L., & Guven, E ,”A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp. 1153-1176, 2016
  38. Van Slyke SR, Van Slyke S, Benson ML. The Oxford Handbook of White Collar Crime. Oxford University Press, 2016
  39. Mittal, S., Das, P. K., Mulwad, V., Joshi, A., & Finin, T. ,”Cyber twitter: Using twitter to generate alerts for cyber security threats and vulnerabilities”, Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 860-867, 2016
  40. Punter A, Coburn A, Ralph D. Evolving risk frameworks: modelling resilient business systems as interconnected networks. Centre for Risk Studies, University of Cambridge, 2016
  41. Kennedy, Mike. ‘Equifax hack shows we need more regulation.’ Daily Herald. Infotrac Newsstand, 2017
  42. Kemal Hajdarevic,Adna Kozic and Indira Avdgic,”Training Network Managers in Ethical Hacking Techniques to Manage Resource Starvation Attacks using GNS3 Simulator”, International Conference on Information, Communication and Automation Technologies (ICAT) , Sarajevo, Bosnia-Herzegovina , pp. 1-6 , Oct 26- 28, 2017
  43. Teoh, T. T., Zhang, Y., Nguwi, Y. Y., Elovici, Y., & Ng, W. L. “Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perception (MLP) to obviate cyber security risk ”, 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp. 1790-1793, IEEE, 2017
  44. Nguyen KD, Rosoff H, Richard SJ. Valuing information security from a phishing attack. In: International Conference on Applied Human Factors and Ergonomics. Cham: Springer, 2017
  45. Lindsay, J. R. “Restrained by design: The political economy of cybersecurity”, Digital Policy, Regulation and Governance, 19, 493–514, 2017
  46. Furnell S, Emm D. “The ABC of ransomware protection”, Comp. Fraud & Sec. (10), pp. 5-11, 2017
  47. M. McGuire, Understanding the Growth of Cybercrime Economy. Bromium, 2018
  48. Khan, R., & Urolagin, S. “Airline Sentiment Visualization, Consumer Loyalty Measurement and Prediction using Twitter Data”, International journal of advanced computer science and applications, 9(6), 380-388, 2018
  49. Xingan Li. “Crucial Elements in Law Enforcement against Cybercrime.” Inte. Journal of Information Security Sci. , vol. 7, no. 3, pp. 140–158, 2018
  50. Foroughi, F., & Luksch, P. “Data Science Methodology for Cybersecurity Projects”, arXiv preprint arXiv:1803.04219., 2018
  51. Bergmann, M. C., Dreißigacker, A., von Skarczinski, B., & Wollinger, G. R. ,”Cyber-Dependent Crime Victimization: The Same Risk for Everyone? Cyberpsychology, Behavior, and Social Networking, 21(2), 84–90, 2018
  52. Hernandez-Suarez, At al.., Social sentiment sensor in Twitter for predicting cyber-attacks using ℓ1 regularization. Sensors, 18(5), 1380, 2018
  53. Verizon Enterprise.. Data Breach Investigations Report, 2018
  54. Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. “On the effectiveness of machine and deep learning for cyber security”, 10th International Conference on Cyber Conflict (CyCon) pp. 371-390. IEEE, 2018
  55. Healthcare Information and Management Systems Society.,HIMSS Cybersecurity Survey, 2018
  56. Bhardwaj, P., Gautam, S., & Pahwa, P. “A novel approach to analyze the sentiments of tweets related to TripAdvisor”, Journal of Information and Optimization Sciences, 39(2), 591-605, 2018
  57. Sarwar Sayeed, and Hector Marco-Gisbert. “Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack.” Applied Sciences , no. 9, p. 1788, 2019
  58. Catherine D. at. al.“Handbook on Crime and Deviance. Handbooks of Sociology and Social Research, 2019
  59. Ying-Yu Lin. “China Cyber Warfare and Cyber Force.” Tamkang Journal of InternationalmAffairs , vol. 22, no. 3, pp. 119–161, 2019
  60. Kranenbarg, M. W., Holt, T. J. & van Gelder J.L. , “Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap, Deviant Behavior,40:1, pp. 40-55, 2019
  61. Grace Odette Boussi,” A Proposed Framework for Controlling Cyber- Crime”, 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),IEEE, India, 2020
  62. Priyanka Datta at. al.,” A Technical Review Report on Cyber Crimes in India”, International Conference on Emerging Smart Computing and Informatics (ESCI),IEEE, India, 2020
  63. Altair, "Cyber security attacks on smart cities and associated mobile technologies", Procedia Computer Science, vol. 109, pp. 1086-1091, 2017
  64. Nikhat Akhtar, Bedine Kerim, Yusuf Perwej, Anurag Tiwari, Sheeba Praveen,“A Comprehensive Overview of Privacy and Data Security for Cloud Storage”, International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Volume 08, Issue 5, Pages 113-152, September- October 2021, DOI: 10.32628/IJSRSET21852
  65. C. S. Kruse, B. Frederick, T. Jacobson and D. K. Monticone, "Cybersecurity in healthcare: A systematic review of modern threats and trends", Tech. and Health Care, vol. 25, no. 1, pp. 1-10, 2017
  66. L. Y. Chang and N. Coppel, "Building cyber security awareness in a developing country: lessons from Myanmar", Computers & Security, vol. 97, pp. 101959, 2020
  67. Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Mohamed Hassan, Nikhat Akhtar, “The Internet-of-Things (IoT) Security: A Technological Perspective and Review” , International Journal of Scientific Research in Computer Science Engineering and Information Technology (IJSRCSEIT), Volume 5, Issue 1, Pages 462-482, February 2019, DOI: 10.32628/CSEIT195193
  68. L. J. Janczewski and A. M. Colarik, Cyber warfare and cyber terrorism, Hershey:Information Science Reference, 2008
  69. N. Choucri and D. Goldsmith, "Lost in cyberspace: harnessing the Internet international relations and global security", Bulletin of the Atomic Scientists, vol. 68, no. 2, pp. 70-77
  70. Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), Volume 8, Issue 1, (Part -I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
  71. Yusuf Perwej, Md. Husamuddin, Majzoob K.Omer, Bedine Kerim, “A Comprehend the Apache Flink in Big Data Environments” , IOSR Journal of Computer Engineering (IOSR-JCE), USA, Volume 20, Issue 1, Ver. IV, Pages 48-58, 2018, DOI: 10.9790/0661-2001044858
  72. C.M. Williams, R. Chaturvedi and K. Chakravarthy, "Cybersecurity Risks in a Pandemic", Journal of Medical Internet Res., vol. 22, no. 9, pp. 23692, 2020
  73. Asif Perwej “The Impact of Pandemic Covid-19 On The Indian Banking System”, International Journal Of Recent Scientific Research (IJRSR), ISSN
  74. –3031, Volume. 11, Issue 10 (B), Pages 39873-39883, 28th October, 2020
  75. S. Wu, Y. Chen, M. Li, X. Luo, Z. Liu and L. Liu, "Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools", EEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 874-887, 2020
  76. S. Aftergood, "Cybersecurity. The Cold war online", Nature, vol. 547, no. 7661, pp. 30, 2017
  77. Yusuf Perwej, Shaikh Abdul Hannan, Firoj Parwej, Nikhat Akhtar , “A Posteriori Perusal of Mobile Computing”, International Journal of Computer Applications Technology and Research (IJCATR), , Volume 3, Issue 9, Pages 569 - 578, September 2014, DOI: 10.7753/IJCATR0309.1008
  78. M. Schwenk Jensen, J. Gruschka and N. Iacono, "On technical security issues in Cloud", IEEE International Conference on Cloud Computing, pp. 109-16, 2009
  79. Yuya Jeremy Ong, Mu Qiao, Ramani Routray and Roger Raphael, "Context-Aware Data Loss Prevention for Cloud Storage Services", 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
  80. X. Jin, W. Sun, Y. Liang, J. Guo and Z. Xie, "Design and implementation of intranet safety monitoring platform for Power secondary system", Automation of Electric Power System, pp. 99-104, Aug. 2011
  81. Yusuf Perwej, Kashiful Haq, Firoj Parwej, M. M. Mohamed Hassan ,“ The Internet of Things (IoT) and its Application Domains”, International Journal of Computer Applications (IJCA) ,USA , ISSN 0975 – 8887, Volume 182, No.49, Pages 36- 49, April 2019,DOI: 10.5120/ijca2019918763
  82. Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science (IJARCS), Volume 10, No. 3, Pages 32-40, 2019, DOI: 10.26483/ijarcs.v10i3.6434
  83. Nikhat Akhtar, Yusuf Perwej, “The Internet of Nano Things (IoNT) Existing State and Future Prospects”, for published in the GSC Advanced Research and Reviews (GSCARR), e-ISSN: 2582-4597, Volume 5, Issue 2, Pages 131-150, November 2020, DOI: 10.30574/gscarr.2020.5.2.0110
  84. Nikhat Akhtar, Saima Rahman, Halima Sadia, Yusuf Perwej, “A Holistic Analysis of Medical Internet of Things (MIoT)”, Journal of Information and Computational Science (JOICS), ISSN: 1548 - 7741, Volume 11, Issue 4, Pages 209 - 222, April 2021, DOI: 10.12733/JICS.2021/V11I3.535569.31023
  85. S. Kowtha, L. A. Nolan and R. A. Daley, "Cyber security operations center characterization model and analysis", Proc. IEEE Conf. Technol. Homeland Secur. (HST), pp. 470-475, Nov. 2012
  86. Lital Asher-Dothan, Seven essential elements of modern endpoin t security, March 2018, [online] Available: https://www.cybereason.com/blog/7-elements-of-modern-endpoint-security
  87. Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”, International Journal of Advanced Research (IJAR), ISSN 2320-5407, Volume 6,Issue 3, Pages 241-258, March 2018, DOI: 10.21474/IJAR01/6672
  88. F. Pasqualetti, F. Dorfler and F. Bullo, "Attack detection and identification in cyber-physical systems", IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715-2729, 2013
  89. Yusuf Perwej, Bedine Kerim, Mohmed Sirelkhtem Adrees, Osama E. Sheta, “An Empirical Exploration of the Yarn in Big Data”, International Journal of Applied Information Systems (IJAIS) – ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA, Volume 12, No.9, Pages 19-29, December 2017, DOI: 10.5120/ijais2017451730
  90. Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”, International Journal of Recent Scientific Research (IJRSR), ISSN: 0976-3031, Volume 9, Issue 11, (A), Pages 29472 – 29493, November 2018, DOI: 10.24327/ijrsr.2018.0911.2869
  91. Asif Perwej, Dr. Kashiful Haq, Dr. Yusuf Perwej, “Blockchain and its Influence on Market”, International Journal of Computer Science Trends and Technology (IJCST), ISSN 2347 – 8578, Volume 7, Issue 5, Pages 82- 91, Sep – Oct 2019, DOI: 10.33144/23478578/IJCST-V7I5P10
  92. Yusuf Perwej, “A Pervasive Review of Blockchain Technology and Its Potential Applications”, Open Science Journal of Electrical and Electronic Engineering (OSJEEE), New York, USA, Volume 5, No. 4, Pages 30 - 43, October, 2018
  93. D. Grpoup, Cyber Crime: New Challenge to Mankind Society Introduction to the Nature of Cyber Crime and its Investigation Process, January 2011
  94. K. K. R. Choo, "The cyber threat landscape", Challenges and future research directions. Computers & Security, vol. 30, no. 8, pp. 719-731, 2011
  95. Mahmoud Khonji, Youssef Iraqi and Andrew Jones, "Literature Review on Phishing Detection", Institute of Electrical and Electronics Engineers Communication Surveys and Tutorials, vol. 15, no. 04, 2013
  96. Lee, K. Kim, H. Lee and M. Jun, "A study on realtime detecting smishing on cloud computing environments" in Advanced Multimedia and Ubiquitous Engineering, Berlin, Heidelberg:Springer, pp. 495-501, 2016
  97. N. Thamsirarak, T. Seethongchuen and P. Ratanaworabhan, "A Case for Malware that Make Antivirus Irrelevant" in , Thailand:IEEE, 2015
  98. Ali, "Ransomware: A research and a personal case study of dealing with this nasty malware", Issues in Informing Science and Information Technology Education, vol. 14, pp. 87-99, 2017
  99. M. Tehranipoor and R. Koushanfar, "A survey of hardware Trojan taxonomy and detection", IEEE design & test of computers, vol. 27, no. 1, 2010
  100. M. Choraś, R. Kozik, D. Puchalski , W. Hołubowicz, "Correlation approach for sql injection attacks detection", Inte. Joint Confe. CISIS’12-ICEUTE´ 12-SOCO´ Special Sessions, pp. 177-185, 2013
  101. Y. Shin, L. Williams and T. Xie, "Sqlunitgen: Sql injection testing using static and dynamic analysis", The 17th IEEE International Symposium on Software Reliability Engineering (ISSRE 2006), 2006
  102. S. T. Zargar, J. Joshi and D. Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks", IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069
  103. Bin Xiao, Wei chen, Yanxiang He, Edwin Hsing and Mean Sha, "An Active Detecting Method against SYN Flooding attack", proceedings of the 11th International conference on Parallel and Distributed Systems ICPADS2005, pp. 709-715, July 2005
  104. Raymond, D.R. and S.F. Midkiff, Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. Pervasive Computing, IEEE, 2008. 7(1): p. 74-81
  105. Abdalla Wasef Marashdih and Zarul Fitri Zaaba, "Cross Site Scripting: Detection Approaches in Web Application", International Journel of Advanced Computer Science and appl., vol. 7, no. 10, 2016
  106. Huajie Xu, Xiaoming Hu and Dongdong Zhang, "A XSS defensive scheme based on behavior certification", Applied Mechanics and Materials, vol. 241–244, pp. 2365-2369, 2013
  107. M. Conti, N. Dragoni and V. Lesyk, "A survey of man in the middle attacks", IEEE Communications Surveys & Tut., vol. 18, no. 3, pp. 2027-2051, 2016
  108. K. Zeng, D. Wu, A. Chan and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks", INFOCOM 2010 Proceedings IEEE, pp. 1-9, 2010
  109. Prof. Kameswara Rao Poranki, Dr. Yusuf Perwej, Dr. Asif Perwej, ”The Level of Customer Satisfaction related to GSM in India “, published by The TIJ's Research Journal of Science & IT Management RJSITM, International Journal's-Research Journal of Science & IT Management of Singapore, Singapore, Volume 04,Number: 03, Pages 29-36 , 2015
  110. Yusuf Perwej , Firoj Parwej, “A Neuroplasticity (Brain Plasticity) Approach to Use in Artificial Neural Network”, International Journal of Scientific & Engineering Research (IJSER), France , ISSN 2229 – 5518, Volume 3, Issue 6, Pages 1- 9, June 2012, DOI: 10.13140/2.1.1693.2808
  111. X. Li, H. Wang, H.-N. Dai, Y. Wang and Q. Zhao, "An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things", Mobile Information Systems, vol. 2016, 2016
  112. Yusuf Perwej, Majzoob K. Omer, Osama E. Sheta, Hani Ali M. Harb, Mohmed S. Adrees, “The Future of Internet of Things (IoT) and Its Empowering Technology” , International Journal of Engineering Science and Computing (IJESC), Volume 9, Issue No.3, Pages 20192– 20203, March 2019
  113. Adnan Amin at. Al. ,” Classification of cyber-attacks based on rough set theory”, First International Conference on Anti-Cybercrime (ICACC), IEEE, Saudi Arabia 2015
  114. R. Sabillon, J. Cano, V. Cavaller and J. Serra, "Cybercrime and Cybercriminals: A Comprehensive Study", International Journal of Computer Networks and Comm. Security, vol. 4, no. 6, pp. 165-176, 2016
  115. Al-Mushayt O., Haq Kashiful, Yusuf Perwej, “Electronic-Government in Saudi Arabia”, a Positive Revolution in the Peninsula”, International Transactions in Applied Sciences, India, ISSN-0974-7273, Volume 1, Number 1, Pages 87-98, July-December 2009
  116. Raymond Wu and Masayuki Hisada, "Static and Dynamic Analysis for Web Security in industry Applications", International Journal of Electronic Security and Digital forensics Inder Science, vol. 3, no. 2, pp. 138-150, 2010
  117. Zhu Huafei, "Towards a Theory of Cyber Security Assessment in the Universal Composable Framework", Information Science and Engineering (ISISE) 2009 Second International Symposium on, pp. 203-207, 26–28 Dec. 2009
  118. T. Chmielecki, P. Cholda, P. Pacyna, P. Potrawka, N. Rapacz, R. Stankiewicz, et al., "Enterprise-oriented cybersecurity management", Computer Science and Information Systems (FedCSIS) 2014 Federated Conference on, pp. 863-870, 7–10 Sept. 2014
  119. Bela Genge, Piroska Haller and Istvan Kiss, "A framework for designing resilient distributed intrusion detection systems for critical infrastructures", International Journal of Critical Infrastructure Protection, vol. 15, pp. 3-11, 2016,
  120. F. Setiadi, P. H. Putra, Y. G. Sucahyo and Z. A. Hasibuan, "Determining components of national cyber security framework using Grounded Theory", Second Int. Conf. Informatics Comput., pp. 1-6, 2017
  121. Y. Nugraha, S. Member and I. A. N. Brown, "An Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirements", IEEE Transactions On Emerging Topics in Computing, vol. 4, no. 1, pp. 47-59, 2016
  122. Z. A. Soomro, M. H. Shah and J. Ahmed, "Information security management needs more holistie approach: A literature review", International Journal of Information Management, vol. 36, no. 2, pp. 215-225, 2016
  123. Z. Trabelsi, K. Hayawi, A. Braiki and S. Mathew, Network Attacks and Defenses: A Hands-on Approach, Boca Raton, Florida:CRC Press, 2013
  124. Brian Komar, Ronald Beekelaar and Joern Wettern, Firewalls for Dummies, pp. 10, August 2001
  125. Imran Ijaz, "Design and Implementation of PKI (For Multi Domain Environment)," Inter. Journal of Com. Theory and Eng. vol. 4, no. 4, pp. 505-509, 2012
  126. C. Weissman, "Security penetration testing guideline" in , US:Handbook for the Computer Security Certification of Trusted Systems, Center for Secure Information Technology, Naval Research Laboratory (NRL), pp. 1-66, 1993
  127. Roumen Trifonov, Georgi Manolov, Radoslav Yoshinov and Galya Pavlova, "A survey of artificial intelligence for enhancing the information security", International Journal of Development Research, vol. 7, no. 11, pp. 16866-16872, 2017
  128. Pranggono and A. Arabo, "COVID-19 pandemic cybersecurity issues", Internet Technology Letter (Wiley), pp. 1-6, 2020
  129. Yusuf Perwej, Majzoob K. Omer, Osama E. Sheta, Hani Ali M. Harb, Mohmed S. Adrees, “The Future of Internet of Things (IoT) and Its Empowering Technology”, International Journal of Engineering Science and Computing (IJESC), ISSN : 2321- 3361, Volume 9, Issue No.3, Pages 20192– 20203, 2019
  130. R. Doshi, N. Apthorpe and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices", 2018 IEEE Security and Privacy Workshops (SPW), pp. 29-35, 2018
  131. N. Scaife, P. Traynor K. Butler, "Making sense of the ransomware mess planning a sensible path forward)", IEEE Potentials, vol. 36, no. 6, pp. 28-31, 2017
  132. Bag, S. Ruj and K. Sakurai, "Bitcoin block withholding attack: Analysis and mitigation", IEEE Transactions on Information Forensics and Security, vol. 12, no. 8, pp. 1967-1978, 2017
  133. Yusuf Perwej, Ashish Chaturvedi, “Machine Recognition of Hand Written Characters using Neural Networks”, International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 14, No. 2, Pages 6- 9, January 2011, DOI: 10.5120/1819-2380
  134. Biometric Systems: Technology Design and Performance Evaluation, Springer Verlag, 2005
  135. Tudzarov , T. Janevski, "Design of 5G Mobile Architecture" International Journal of Communication Networks and Information Security, Vol. 3, No. 2, August 2011
  136. Yusuf Perwej, Kashiful Haq, Uruj Jaleel, Sharad Saxena, “Some Drastic Improvements Found in the Analysis of Routing Protocol for the Bluetooth Technology Using Scatternet”, Special Issue on The International Conference on Computing, Communications and Information Technology Applications (CCITA-2010), Ubiquitous Computing and Communication Journal (UBICC), Seoul, South Korea, ISSN Online: 1992-8424, Volume CCITA-2010, Number 5 , Pages 86-95, 2010
  137. Nikhat Akhtar, Devendera Agarwal, “A Literature Review of Empirical Studies of Recommendation Systems”, International Journal of Applied Information Systems (IJAIS), ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA, Volume 10, No.2, Pages 6 – 14, December 2015, DOI: 10.5120/ijais2015451467
  138. Nikhat Akhtar, Devendera Agarwal, “An Influential Recommendation System Usage for General Users”, Communications on Applied Electronics (CAE), ISSN : 2394-4714, Foundation of Computer Science, New York, USA, Vol. 5, No.7, Pages 5 – 9, 2016, DOI: 10.5120/cae2016652315
  139. Nikhat Akhtar, Devendra Agarwal, “A Survey of Imperfection of Existing Recommender System for Academic Fraternity”, IOSR Journal of Computer Engineering (IOSR-JCE), p-ISSN: 2278-8727 , Volume 20 , Issue 3, Pages 08-15, Ver.III(May – June. 2018), DOI: 10.9790/0661-2003030815
  140. Qiang Tang and Jun Wang. “Privacy preserving context-aware recommender systems: Analysis and new solutions”, In G. Pernul, P. Y. A. Ryan, and E. R. Weippl, editors, Computer Security ESORICS 2015, volume 9327, pages 101–119. Springer, 2015
  141. Nikhat Akhtar, “A Model Based Research Material Recommendation System For Individual Users”, Transactions on Machine Learning and Artificial Intelligence (TMLAI), Society for Science and Education, United Kingdom (UK), ISSN 2054-7390, Vol. 5, Issue 2, Pages 1 - 8, March 2017, DOI: 10.14738/tmlai.52.2842
  142. Arjan Jeckmans, Andreas Peter, and Pieter Hartel. “Efficient privacy-enhanced familiarity based recommender system”, In Computer Security–ESORICS 2013, pages 400–417. Springer, 2013
  143. Nikhat Akhtar, Devendera Agarwal, “An Efficient Mining for Recommendation System for Academics”, International Journal of Recent Technology and Engineering (IJRTE), ISSN 2277-3878 (online), SCOPUS, Volume-8, Issue-5, Pages 1619-1626, 2020, DOI: 10.35940/ijrte.E5924.018520
  144. Nikhat Akhtar, “Perceptual Evolution for Software Project Cost Estimation using Ant Colony System”, International Journal of Computer Applications (IJCA) USA, Volume 81, No.14, Pages 23 – 30, 2013, DOI: 10.5120/14185-2385
  145. ENISA threat landscape report 2018: 15 Top Cyber-Threats and Trends, 2019, [online] Available: https://doi.org/10.2824/