Abstract
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace. Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.
Keywords
- Cyber Security
- Cyber Attacks
- Phishing
- Cyber Crime
- Network Security
- Internet of Things (IoT) Security
- Cyber Security Frameworks
- Malware.
References
- Barry M. Leiner at. al., “A Brief History of the Internet,” ACM SIGCOMM Computer Communication Review, Volume 39, Number 5, October 2009
- M. Gallaher, A. Link and B. Rowe, Cyber Security: Economic Strategies and Public Policy Alternatives, Edward Elgar Publishing, 2008
- T. Rid and B. Buchanan, "Attributing cyber-attacks", Journal of Strate St., vol. 38, no. 1-2, pp. 4-37, 2015
- B. Zhu, A. Joseph and S. Sastry, "A taxonomy of cyber-attacks on SCADA systems", 2011 International conference on internet of things and 4th international conference on cyber physical and social computing, pp. 380-388, 2011
- Lillian Ablon, Martin C. Libicki and Andrea A. Golay, Markets for Cybercnme Tools and Stolen Data: Hackers’ Bazaar, pp. 1-85, 2014
- Dawson, J. and Thomson, R., “The future cybersecurity workforce: Going beyond technical skills for successful cyber performance”, Frontiers in Psychology, 9(JUN), pp. 1–12, 2018, doi: 10.3389/fpsyg.2018.0074
- C. L. Philip, Q. Chen and C. Y. Zhang, "Data-intensive applications challenges techniques and technologies: A survey on big data", Information Sciences, vol. 275, pp. 314-347, 2014
- Yusuf Perwej, “An Experiential Study of the Big Data”, International Transaction of Electrical and Computer Engineers System (ITECES), USA, ISSN (Print): 2373-1273 ISSN (Online): 2373-1281, Science and Education Publishing, Volume 4, No. 1, Pages 14-25, 2017, DOI: 10.12691/iteces-4-1-3
- Yusuf Perwej ,“ The Hadoop Security in Big Data: A Technological Viewpoint and Analysis ”, International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE) , E-ISSN: 2320-7639, Volume 7, Issue 3, Pages 1- 14, June 2019, DOI: 10.26438/ijsrcse/v7i3.1014
- Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop Technology”, International Transaction of Electrical and Computer Engineers System (ITECES), USA, Volume 4, No. 1, Pages 26-38, 2017 , DOI: 10.12691/iteces-4-1-4
- Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), ISSN : 2248-9622, Volume 8, Issue 1, ( Part -I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
- Cagri B Aslan, Rahime Belen Saglam and Shujun Li, "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example", SMSociety, July 2018.
- Igor Skrjanc, Seiichi Ozawa, Tao Ban and Dejan Dovzan, "Large-scale cyber-attacks monitoring using Evolving CauchyPossibilistic Clustering" in Applied Soft Computing, Elsevier, vol. 62, pp. 592-601, 2018
- Praveen Paliwal, "Cyber Crime", Nations Congress on the Prevention of Crime and Treatment of Offenders, March 2016
- M. Kjaerland, "A taxonomy and comparison of computer security incidents from the commercial and government sectors", Comput. Secur., vol. 25, no. 7, pp. 522-538, 200
- M. A. Faysel and S. S. Haque, "Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems", IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 10, no. 7, 2010
- Le Compte, D. Elizondo and T. Watson, "A renewed approach to serious games for cyber security", 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, pp. 203-216, 2015
- N. Virvilis, A. Mylonas, N. Tsalis and D. Gritzalis, "Security Busters: Web browser security vs. rogue sites", Comput. Secur., vol. 52, pp. 90-105, 2015
- P. Chen, L. Desmet and C. Huygens, "A study on advanced persistent threats" in Communications and Multimedia Security, Springer, pp. 63-72, 2014
- Yusuf Perwej, “An Evaluation of Deep Learning Miniature Concerning in Soft Computing”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN Volume 4, Issue 2, Pages 10 - 16, February 2015 DOI: 10.17148/IJARCCE.2015.4203
- B. M. Thuraisingham, "Can AI be for Good in the Midst of Security Attacks and Privacy Violations?", Proceedings ACM CODASPY, 2020
- Yusuf Perwej , “Recurrent Neural Network Method in Arabic Words Recognition System”, International Journal of Computer Science and Telecommunications (IJCST), Sysbase Solution (Ltd), UK, London, ISSN 2047-3338, Volume 3, Issue 11, Pages 43-48, November 2012.
- Brenner SW. Cybercrime metrics: old wine, new bottles? Va. JL & Tech, 9:13–13, 2004
- Kshetri N. The simple economics of cybercrimes, IEEE Secur Priv, 4, pp. 33–39, 2006
- Maloof, M. A. (Ed.), Machine learning and data mining for computer security: methods and applications. Springer Science Business Media, 2006
- M. Cross and D. L. Shinder, Scene of the cybercrime.Syngress Pub., 2008
- N. Dhanjani, B. Rios, and B. Hardin, Hacking: The Next Generation: The Next Generation. O’Reilly Media, Inc., 2009
- Y Perwej, K Haq, U Jaleel, F Parwej, “Block ciphering in KSA, A major breakthrough in cryptography analysis in wireless networks”, International Transactions in Mathematical Sciences and Computer, India, ISSN-0974-5068, Volume 2, No. 2, Pages 369-385, July-December 2009
- Fink, E., Sharifi, M., & Carbonell, J. G. “Application of machine learning and crowdsourcing to detection of cybersecurity threats”, In Proceedings of the US Department of Homeland Security Science Conference–Fifth Annual University Network Summit, Washington, DC., 2011
- Greenfield VA, Pa. L. A framework to assess the harm of crim. Br J Crimi., vol. 53, pp. 864–885, 2013
- T. Grant and S. Liles, On the military geography of cyberspace,'' Proc. Int. Conf. Inf. Warfa, p. 66, 2014
- M. Chertoff and P. Rosenzweig. (Mar. 1, 2015). A Primer on Globally Harmonizing Internet Jurisdiction and Regulations, accessed on oct. 15, 2015.
- Mathieu, T. & Guy, P., “A Framework for Guiding and Evaluating Literature reviews”, Communications of the Association for Inf. System, 37(6), pp 6, 2015
- H. Lin. (May 15, 2015). Thinking About Nuclear and Cyber Con_ict: Same Questions, Different Answers, accessed on Oct. 15, 2015.
- Hernández, A., Sanchez, V., Sánchez, G., Pérez, H., Olivares, J., Toscano, K., & Martinez, V. (2016, March). Security attack prediction based on user sentiment analysis of Twitter data. In 2016 IEEE international conference on industrial technology (ICIT) (pp. 610-617). IEEE.
- Edwards B, Hofmeyr S, Forrest S. Hype and heavy tails: a closer look at data breaches. J Cyber secur 2016;2:3–14
- Buczak, A. L., & Guven, E ,”A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp. 1153-1176, 2016
- Van Slyke SR, Van Slyke S, Benson ML. The Oxford Handbook of White Collar Crime. Oxford University Press, 2016
- Mittal, S., Das, P. K., Mulwad, V., Joshi, A., & Finin, T. ,”Cyber twitter: Using twitter to generate alerts for cyber security threats and vulnerabilities”, Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 860-867, 2016
- Punter A, Coburn A, Ralph D. Evolving risk frameworks: modelling resilient business systems as interconnected networks. Centre for Risk Studies, University of Cambridge, 2016
- Kennedy, Mike. ‘Equifax hack shows we need more regulation.’ Daily Herald. Infotrac Newsstand, 2017
- Kemal Hajdarevic,Adna Kozic and Indira Avdgic,”Training Network Managers in Ethical Hacking Techniques to Manage Resource Starvation Attacks using GNS3 Simulator”, International Conference on Information, Communication and Automation Technologies (ICAT) , Sarajevo, Bosnia-Herzegovina , pp. 1-6 , Oct 26- 28, 2017
- Teoh, T. T., Zhang, Y., Nguwi, Y. Y., Elovici, Y., & Ng, W. L. “Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perception (MLP) to obviate cyber security risk ”, 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp. 1790-1793, IEEE, 2017
- Nguyen KD, Rosoff H, Richard SJ. Valuing information security from a phishing attack. In: International Conference on Applied Human Factors and Ergonomics. Cham: Springer, 2017
- Lindsay, J. R. “Restrained by design: The political economy of cybersecurity”, Digital Policy, Regulation and Governance, 19, 493–514, 2017
- Furnell S, Emm D. “The ABC of ransomware protection”, Comp. Fraud & Sec. (10), pp. 5-11, 2017
- M. McGuire, Understanding the Growth of Cybercrime Economy. Bromium, 2018
- Khan, R., & Urolagin, S. “Airline Sentiment Visualization, Consumer Loyalty Measurement and Prediction using Twitter Data”, International journal of advanced computer science and applications, 9(6), 380-388, 2018
- Xingan Li. “Crucial Elements in Law Enforcement against Cybercrime.” Inte. Journal of Information Security Sci. , vol. 7, no. 3, pp. 140–158, 2018
- Foroughi, F., & Luksch, P. “Data Science Methodology for Cybersecurity Projects”, arXiv preprint arXiv:1803.04219., 2018
- Bergmann, M. C., Dreißigacker, A., von Skarczinski, B., & Wollinger, G. R. ,”Cyber-Dependent Crime Victimization: The Same Risk for Everyone? Cyberpsychology, Behavior, and Social Networking, 21(2), 84–90, 2018
- Hernandez-Suarez, At al.., Social sentiment sensor in Twitter for predicting cyber-attacks using ℓ1 regularization. Sensors, 18(5), 1380, 2018
- Verizon Enterprise.. Data Breach Investigations Report, 2018
- Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. “On the effectiveness of machine and deep learning for cyber security”, 10th International Conference on Cyber Conflict (CyCon) pp. 371-390. IEEE, 2018
- Healthcare Information and Management Systems Society.,HIMSS Cybersecurity Survey, 2018
- Bhardwaj, P., Gautam, S., & Pahwa, P. “A novel approach to analyze the sentiments of tweets related to TripAdvisor”, Journal of Information and Optimization Sciences, 39(2), 591-605, 2018
- Sarwar Sayeed, and Hector Marco-Gisbert. “Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack.” Applied Sciences , no. 9, p. 1788, 2019
- Catherine D. at. al.“Handbook on Crime and Deviance. Handbooks of Sociology and Social Research, 2019
- Ying-Yu Lin. “China Cyber Warfare and Cyber Force.” Tamkang Journal of InternationalmAffairs , vol. 22, no. 3, pp. 119–161, 2019
- Kranenbarg, M. W., Holt, T. J. & van Gelder J.L. , “Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap, Deviant Behavior,40:1, pp. 40-55, 2019
- Grace Odette Boussi,” A Proposed Framework for Controlling Cyber- Crime”, 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),IEEE, India, 2020
- Priyanka Datta at. al.,” A Technical Review Report on Cyber Crimes in India”, International Conference on Emerging Smart Computing and Informatics (ESCI),IEEE, India, 2020
- Altair, "Cyber security attacks on smart cities and associated mobile technologies", Procedia Computer Science, vol. 109, pp. 1086-1091, 2017
- Nikhat Akhtar, Bedine Kerim, Yusuf Perwej, Anurag Tiwari, Sheeba Praveen,“A Comprehensive Overview of Privacy and Data Security for Cloud Storage”, International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Volume 08, Issue 5, Pages 113-152, September- October 2021, DOI: 10.32628/IJSRSET21852
- C. S. Kruse, B. Frederick, T. Jacobson and D. K. Monticone, "Cybersecurity in healthcare: A systematic review of modern threats and trends", Tech. and Health Care, vol. 25, no. 1, pp. 1-10, 2017
- L. Y. Chang and N. Coppel, "Building cyber security awareness in a developing country: lessons from Myanmar", Computers & Security, vol. 97, pp. 101959, 2020
- Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Mohamed Hassan, Nikhat Akhtar, “The Internet-of-Things (IoT) Security: A Technological Perspective and Review” , International Journal of Scientific Research in Computer Science Engineering and Information Technology (IJSRCSEIT), Volume 5, Issue 1, Pages 462-482, February 2019, DOI: 10.32628/CSEIT195193
- L. J. Janczewski and A. M. Colarik, Cyber warfare and cyber terrorism, Hershey:Information Science Reference, 2008
- N. Choucri and D. Goldsmith, "Lost in cyberspace: harnessing the Internet international relations and global security", Bulletin of the Atomic Scientists, vol. 68, no. 2, pp. 70-77
- Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), Volume 8, Issue 1, (Part -I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
- Yusuf Perwej, Md. Husamuddin, Majzoob K.Omer, Bedine Kerim, “A Comprehend the Apache Flink in Big Data Environments” , IOSR Journal of Computer Engineering (IOSR-JCE), USA, Volume 20, Issue 1, Ver. IV, Pages 48-58, 2018, DOI: 10.9790/0661-2001044858
- C.M. Williams, R. Chaturvedi and K. Chakravarthy, "Cybersecurity Risks in a Pandemic", Journal of Medical Internet Res., vol. 22, no. 9, pp. 23692, 2020
- Asif Perwej “The Impact of Pandemic Covid-19 On The Indian Banking System”, International Journal Of Recent Scientific Research (IJRSR), ISSN
- –3031, Volume. 11, Issue 10 (B), Pages 39873-39883, 28th October, 2020
- S. Wu, Y. Chen, M. Li, X. Luo, Z. Liu and L. Liu, "Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools", EEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 874-887, 2020
- S. Aftergood, "Cybersecurity. The Cold war online", Nature, vol. 547, no. 7661, pp. 30, 2017
- Yusuf Perwej, Shaikh Abdul Hannan, Firoj Parwej, Nikhat Akhtar , “A Posteriori Perusal of Mobile Computing”, International Journal of Computer Applications Technology and Research (IJCATR), , Volume 3, Issue 9, Pages 569 - 578, September 2014, DOI: 10.7753/IJCATR0309.1008
- M. Schwenk Jensen, J. Gruschka and N. Iacono, "On technical security issues in Cloud", IEEE International Conference on Cloud Computing, pp. 109-16, 2009
- Yuya Jeremy Ong, Mu Qiao, Ramani Routray and Roger Raphael, "Context-Aware Data Loss Prevention for Cloud Storage Services", 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
- X. Jin, W. Sun, Y. Liang, J. Guo and Z. Xie, "Design and implementation of intranet safety monitoring platform for Power secondary system", Automation of Electric Power System, pp. 99-104, Aug. 2011
- Yusuf Perwej, Kashiful Haq, Firoj Parwej, M. M. Mohamed Hassan ,“ The Internet of Things (IoT) and its Application Domains”, International Journal of Computer Applications (IJCA) ,USA , ISSN 0975 – 8887, Volume 182, No.49, Pages 36- 49, April 2019,DOI: 10.5120/ijca2019918763
- Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science (IJARCS), Volume 10, No. 3, Pages 32-40, 2019, DOI: 10.26483/ijarcs.v10i3.6434
- Nikhat Akhtar, Yusuf Perwej, “The Internet of Nano Things (IoNT) Existing State and Future Prospects”, for published in the GSC Advanced Research and Reviews (GSCARR), e-ISSN: 2582-4597, Volume 5, Issue 2, Pages 131-150, November 2020, DOI: 10.30574/gscarr.2020.5.2.0110
- Nikhat Akhtar, Saima Rahman, Halima Sadia, Yusuf Perwej, “A Holistic Analysis of Medical Internet of Things (MIoT)”, Journal of Information and Computational Science (JOICS), ISSN: 1548 - 7741, Volume 11, Issue 4, Pages 209 - 222, April 2021, DOI: 10.12733/JICS.2021/V11I3.535569.31023
- S. Kowtha, L. A. Nolan and R. A. Daley, "Cyber security operations center characterization model and analysis", Proc. IEEE Conf. Technol. Homeland Secur. (HST), pp. 470-475, Nov. 2012
- Lital Asher-Dothan, Seven essential elements of modern endpoin t security, March 2018, [online] Available: https://www.cybereason.com/blog/7-elements-of-modern-endpoint-security
- Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”, International Journal of Advanced Research (IJAR), ISSN 2320-5407, Volume 6,Issue 3, Pages 241-258, March 2018, DOI: 10.21474/IJAR01/6672
- F. Pasqualetti, F. Dorfler and F. Bullo, "Attack detection and identification in cyber-physical systems", IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715-2729, 2013
- Yusuf Perwej, Bedine Kerim, Mohmed Sirelkhtem Adrees, Osama E. Sheta, “An Empirical Exploration of the Yarn in Big Data”, International Journal of Applied Information Systems (IJAIS) – ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA, Volume 12, No.9, Pages 19-29, December 2017, DOI: 10.5120/ijais2017451730
- Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”, International Journal of Recent Scientific Research (IJRSR), ISSN: 0976-3031, Volume 9, Issue 11, (A), Pages 29472 – 29493, November 2018, DOI: 10.24327/ijrsr.2018.0911.2869
- Asif Perwej, Dr. Kashiful Haq, Dr. Yusuf Perwej, “Blockchain and its Influence on Market”, International Journal of Computer Science Trends and Technology (IJCST), ISSN 2347 – 8578, Volume 7, Issue 5, Pages 82- 91, Sep – Oct 2019, DOI: 10.33144/23478578/IJCST-V7I5P10
- Yusuf Perwej, “A Pervasive Review of Blockchain Technology and Its Potential Applications”, Open Science Journal of Electrical and Electronic Engineering (OSJEEE), New York, USA, Volume 5, No. 4, Pages 30 - 43, October, 2018
- D. Grpoup, Cyber Crime: New Challenge to Mankind Society Introduction to the Nature of Cyber Crime and its Investigation Process, January 2011
- K. K. R. Choo, "The cyber threat landscape", Challenges and future research directions. Computers & Security, vol. 30, no. 8, pp. 719-731, 2011
- Mahmoud Khonji, Youssef Iraqi and Andrew Jones, "Literature Review on Phishing Detection", Institute of Electrical and Electronics Engineers Communication Surveys and Tutorials, vol. 15, no. 04, 2013
- Lee, K. Kim, H. Lee and M. Jun, "A study on realtime detecting smishing on cloud computing environments" in Advanced Multimedia and Ubiquitous Engineering, Berlin, Heidelberg:Springer, pp. 495-501, 2016
- N. Thamsirarak, T. Seethongchuen and P. Ratanaworabhan, "A Case for Malware that Make Antivirus Irrelevant" in , Thailand:IEEE, 2015
- Ali, "Ransomware: A research and a personal case study of dealing with this nasty malware", Issues in Informing Science and Information Technology Education, vol. 14, pp. 87-99, 2017
- M. Tehranipoor and R. Koushanfar, "A survey of hardware Trojan taxonomy and detection", IEEE design & test of computers, vol. 27, no. 1, 2010
- M. Choraś, R. Kozik, D. Puchalski , W. Hołubowicz, "Correlation approach for sql injection attacks detection", Inte. Joint Confe. CISIS’12-ICEUTE´ 12-SOCO´ Special Sessions, pp. 177-185, 2013
- Y. Shin, L. Williams and T. Xie, "Sqlunitgen: Sql injection testing using static and dynamic analysis", The 17th IEEE International Symposium on Software Reliability Engineering (ISSRE 2006), 2006
- S. T. Zargar, J. Joshi and D. Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks", IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069
- Bin Xiao, Wei chen, Yanxiang He, Edwin Hsing and Mean Sha, "An Active Detecting Method against SYN Flooding attack", proceedings of the 11th International conference on Parallel and Distributed Systems ICPADS2005, pp. 709-715, July 2005
- Raymond, D.R. and S.F. Midkiff, Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. Pervasive Computing, IEEE, 2008. 7(1): p. 74-81
- Abdalla Wasef Marashdih and Zarul Fitri Zaaba, "Cross Site Scripting: Detection Approaches in Web Application", International Journel of Advanced Computer Science and appl., vol. 7, no. 10, 2016
- Huajie Xu, Xiaoming Hu and Dongdong Zhang, "A XSS defensive scheme based on behavior certification", Applied Mechanics and Materials, vol. 241–244, pp. 2365-2369, 2013
- M. Conti, N. Dragoni and V. Lesyk, "A survey of man in the middle attacks", IEEE Communications Surveys & Tut., vol. 18, no. 3, pp. 2027-2051, 2016
- K. Zeng, D. Wu, A. Chan and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks", INFOCOM 2010 Proceedings IEEE, pp. 1-9, 2010
- Prof. Kameswara Rao Poranki, Dr. Yusuf Perwej, Dr. Asif Perwej, ”The Level of Customer Satisfaction related to GSM in India “, published by The TIJ's Research Journal of Science & IT Management RJSITM, International Journal's-Research Journal of Science & IT Management of Singapore, Singapore, Volume 04,Number: 03, Pages 29-36 , 2015
- Yusuf Perwej , Firoj Parwej, “A Neuroplasticity (Brain Plasticity) Approach to Use in Artificial Neural Network”, International Journal of Scientific & Engineering Research (IJSER), France , ISSN 2229 – 5518, Volume 3, Issue 6, Pages 1- 9, June 2012, DOI: 10.13140/2.1.1693.2808
- X. Li, H. Wang, H.-N. Dai, Y. Wang and Q. Zhao, "An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things", Mobile Information Systems, vol. 2016, 2016
- Yusuf Perwej, Majzoob K. Omer, Osama E. Sheta, Hani Ali M. Harb, Mohmed S. Adrees, “The Future of Internet of Things (IoT) and Its Empowering Technology” , International Journal of Engineering Science and Computing (IJESC), Volume 9, Issue No.3, Pages 20192– 20203, March 2019
- Adnan Amin at. Al. ,” Classification of cyber-attacks based on rough set theory”, First International Conference on Anti-Cybercrime (ICACC), IEEE, Saudi Arabia 2015
- R. Sabillon, J. Cano, V. Cavaller and J. Serra, "Cybercrime and Cybercriminals: A Comprehensive Study", International Journal of Computer Networks and Comm. Security, vol. 4, no. 6, pp. 165-176, 2016
- Al-Mushayt O., Haq Kashiful, Yusuf Perwej, “Electronic-Government in Saudi Arabia”, a Positive Revolution in the Peninsula”, International Transactions in Applied Sciences, India, ISSN-0974-7273, Volume 1, Number 1, Pages 87-98, July-December 2009
- Raymond Wu and Masayuki Hisada, "Static and Dynamic Analysis for Web Security in industry Applications", International Journal of Electronic Security and Digital forensics Inder Science, vol. 3, no. 2, pp. 138-150, 2010
- Zhu Huafei, "Towards a Theory of Cyber Security Assessment in the Universal Composable Framework", Information Science and Engineering (ISISE) 2009 Second International Symposium on, pp. 203-207, 26–28 Dec. 2009
- T. Chmielecki, P. Cholda, P. Pacyna, P. Potrawka, N. Rapacz, R. Stankiewicz, et al., "Enterprise-oriented cybersecurity management", Computer Science and Information Systems (FedCSIS) 2014 Federated Conference on, pp. 863-870, 7–10 Sept. 2014
- Bela Genge, Piroska Haller and Istvan Kiss, "A framework for designing resilient distributed intrusion detection systems for critical infrastructures", International Journal of Critical Infrastructure Protection, vol. 15, pp. 3-11, 2016,
- F. Setiadi, P. H. Putra, Y. G. Sucahyo and Z. A. Hasibuan, "Determining components of national cyber security framework using Grounded Theory", Second Int. Conf. Informatics Comput., pp. 1-6, 2017
- Y. Nugraha, S. Member and I. A. N. Brown, "An Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirements", IEEE Transactions On Emerging Topics in Computing, vol. 4, no. 1, pp. 47-59, 2016
- Z. A. Soomro, M. H. Shah and J. Ahmed, "Information security management needs more holistie approach: A literature review", International Journal of Information Management, vol. 36, no. 2, pp. 215-225, 2016
- Z. Trabelsi, K. Hayawi, A. Braiki and S. Mathew, Network Attacks and Defenses: A Hands-on Approach, Boca Raton, Florida:CRC Press, 2013
- Brian Komar, Ronald Beekelaar and Joern Wettern, Firewalls for Dummies, pp. 10, August 2001
- Imran Ijaz, "Design and Implementation of PKI (For Multi Domain Environment)," Inter. Journal of Com. Theory and Eng. vol. 4, no. 4, pp. 505-509, 2012
- C. Weissman, "Security penetration testing guideline" in , US:Handbook for the Computer Security Certification of Trusted Systems, Center for Secure Information Technology, Naval Research Laboratory (NRL), pp. 1-66, 1993
- Roumen Trifonov, Georgi Manolov, Radoslav Yoshinov and Galya Pavlova, "A survey of artificial intelligence for enhancing the information security", International Journal of Development Research, vol. 7, no. 11, pp. 16866-16872, 2017
- Pranggono and A. Arabo, "COVID-19 pandemic cybersecurity issues", Internet Technology Letter (Wiley), pp. 1-6, 2020
- Yusuf Perwej, Majzoob K. Omer, Osama E. Sheta, Hani Ali M. Harb, Mohmed S. Adrees, “The Future of Internet of Things (IoT) and Its Empowering Technology”, International Journal of Engineering Science and Computing (IJESC), ISSN : 2321- 3361, Volume 9, Issue No.3, Pages 20192– 20203, 2019
- R. Doshi, N. Apthorpe and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices", 2018 IEEE Security and Privacy Workshops (SPW), pp. 29-35, 2018
- N. Scaife, P. Traynor K. Butler, "Making sense of the ransomware mess planning a sensible path forward)", IEEE Potentials, vol. 36, no. 6, pp. 28-31, 2017
- Bag, S. Ruj and K. Sakurai, "Bitcoin block withholding attack: Analysis and mitigation", IEEE Transactions on Information Forensics and Security, vol. 12, no. 8, pp. 1967-1978, 2017
- Yusuf Perwej, Ashish Chaturvedi, “Machine Recognition of Hand Written Characters using Neural Networks”, International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 14, No. 2, Pages 6- 9, January 2011, DOI: 10.5120/1819-2380
- Biometric Systems: Technology Design and Performance Evaluation, Springer Verlag, 2005
- Tudzarov , T. Janevski, "Design of 5G Mobile Architecture" International Journal of Communication Networks and Information Security, Vol. 3, No. 2, August 2011
- Yusuf Perwej, Kashiful Haq, Uruj Jaleel, Sharad Saxena, “Some Drastic Improvements Found in the Analysis of Routing Protocol for the Bluetooth Technology Using Scatternet”, Special Issue on The International Conference on Computing, Communications and Information Technology Applications (CCITA-2010), Ubiquitous Computing and Communication Journal (UBICC), Seoul, South Korea, ISSN Online: 1992-8424, Volume CCITA-2010, Number 5 , Pages 86-95, 2010
- Nikhat Akhtar, Devendera Agarwal, “A Literature Review of Empirical Studies of Recommendation Systems”, International Journal of Applied Information Systems (IJAIS), ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA, Volume 10, No.2, Pages 6 – 14, December 2015, DOI: 10.5120/ijais2015451467
- Nikhat Akhtar, Devendera Agarwal, “An Influential Recommendation System Usage for General Users”, Communications on Applied Electronics (CAE), ISSN : 2394-4714, Foundation of Computer Science, New York, USA, Vol. 5, No.7, Pages 5 – 9, 2016, DOI: 10.5120/cae2016652315
- Nikhat Akhtar, Devendra Agarwal, “A Survey of Imperfection of Existing Recommender System for Academic Fraternity”, IOSR Journal of Computer Engineering (IOSR-JCE), p-ISSN: 2278-8727 , Volume 20 , Issue 3, Pages 08-15, Ver.III(May – June. 2018), DOI: 10.9790/0661-2003030815
- Qiang Tang and Jun Wang. “Privacy preserving context-aware recommender systems: Analysis and new solutions”, In G. Pernul, P. Y. A. Ryan, and E. R. Weippl, editors, Computer Security ESORICS 2015, volume 9327, pages 101–119. Springer, 2015
- Nikhat Akhtar, “A Model Based Research Material Recommendation System For Individual Users”, Transactions on Machine Learning and Artificial Intelligence (TMLAI), Society for Science and Education, United Kingdom (UK), ISSN 2054-7390, Vol. 5, Issue 2, Pages 1 - 8, March 2017, DOI: 10.14738/tmlai.52.2842
- Arjan Jeckmans, Andreas Peter, and Pieter Hartel. “Efficient privacy-enhanced familiarity based recommender system”, In Computer Security–ESORICS 2013, pages 400–417. Springer, 2013
- Nikhat Akhtar, Devendera Agarwal, “An Efficient Mining for Recommendation System for Academics”, International Journal of Recent Technology and Engineering (IJRTE), ISSN 2277-3878 (online), SCOPUS, Volume-8, Issue-5, Pages 1619-1626, 2020, DOI: 10.35940/ijrte.E5924.018520
- Nikhat Akhtar, “Perceptual Evolution for Software Project Cost Estimation using Ant Colony System”, International Journal of Computer Applications (IJCA) USA, Volume 81, No.14, Pages 23 – 30, 2013, DOI: 10.5120/14185-2385
- ENISA threat landscape report 2018: 15 Top Cyber-Threats and Trends, 2019, [online] Available: https://doi.org/10.2824/