A Systematic Literature Review on the Cyber Security
Downloads
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace. Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.
Downloads
Barry M. Leiner at. al., “A Brief History of the Internet,” ACM SIGCOMM Computer Communication Review, Volume 39, Number 5, October 2009
M. Gallaher, A. Link and B. Rowe, Cyber Security: Economic Strategies and Public Policy Alternatives, Edward Elgar Publishing, 2008
T. Rid and B. Buchanan, "Attributing cyber-attacks", Journal of Strate St., vol. 38, no. 1-2, pp. 4-37, 2015
B. Zhu, A. Joseph and S. Sastry, "A taxonomy of cyber-attacks on SCADA systems", 2011 International conference on internet of things and 4th international conference on cyber physical and social computing, pp. 380-388, 2011
Lillian Ablon, Martin C. Libicki and Andrea A. Golay, Markets for Cybercnme Tools and Stolen Data: Hackers’ Bazaar, pp. 1-85, 2014
Dawson, J. and Thomson, R., “The future cybersecurity workforce: Going beyond technical skills for successful cyber performance”, Frontiers in Psychology, 9(JUN), pp. 1–12, 2018, doi: 10.3389/fpsyg.2018.0074
C. L. Philip, Q. Chen and C. Y. Zhang, "Data-intensive applications challenges techniques and technologies: A survey on big data", Information Sciences, vol. 275, pp. 314-347, 2014
Yusuf Perwej, “An Experiential Study of the Big Data”, International Transaction of Electrical and Computer Engineers System (ITECES), USA, ISSN (Print): 2373-1273 ISSN (Online): 2373-1281, Science and Education Publishing, Volume 4, No. 1, Pages 14-25, 2017, DOI: 10.12691/iteces-4-1-3
Yusuf Perwej ,“ The Hadoop Security in Big Data: A Technological Viewpoint and Analysis ”, International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE) , E-ISSN: 2320-7639, Volume 7, Issue 3, Pages 1- 14, June 2019, DOI: 10.26438/ijsrcse/v7i3.1014
Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop Technology”, International Transaction of Electrical and Computer Engineers System (ITECES), USA, Volume 4, No. 1, Pages 26-38, 2017 , DOI: 10.12691/iteces-4-1-4
Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), ISSN : 2248-9622, Volume 8, Issue 1, ( Part -I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
Cagri B Aslan, Rahime Belen Saglam and Shujun Li, "Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example", SMSociety, July 2018.
Igor Skrjanc, Seiichi Ozawa, Tao Ban and Dejan Dovzan, "Large-scale cyber-attacks monitoring using Evolving CauchyPossibilistic Clustering" in Applied Soft Computing, Elsevier, vol. 62, pp. 592-601, 2018
Praveen Paliwal, "Cyber Crime", Nations Congress on the Prevention of Crime and Treatment of Offenders, March 2016
M. Kjaerland, "A taxonomy and comparison of computer security incidents from the commercial and government sectors", Comput. Secur., vol. 25, no. 7, pp. 522-538, 200
M. A. Faysel and S. S. Haque, "Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems", IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 10, no. 7, 2010
Le Compte, D. Elizondo and T. Watson, "A renewed approach to serious games for cyber security", 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, pp. 203-216, 2015
N. Virvilis, A. Mylonas, N. Tsalis and D. Gritzalis, "Security Busters: Web browser security vs. rogue sites", Comput. Secur., vol. 52, pp. 90-105, 2015
P. Chen, L. Desmet and C. Huygens, "A study on advanced persistent threats" in Communications and Multimedia Security, Springer, pp. 63-72, 2014
Yusuf Perwej, “An Evaluation of Deep Learning Miniature Concerning in Soft Computing”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN Volume 4, Issue 2, Pages 10 - 16, February 2015 DOI: 10.17148/IJARCCE.2015.4203
B. M. Thuraisingham, "Can AI be for Good in the Midst of Security Attacks and Privacy Violations?", Proceedings ACM CODASPY, 2020
Yusuf Perwej , “Recurrent Neural Network Method in Arabic Words Recognition System”, International Journal of Computer Science and Telecommunications (IJCST), Sysbase Solution (Ltd), UK, London, ISSN 2047-3338, Volume 3, Issue 11, Pages 43-48, November 2012.
Brenner SW. Cybercrime metrics: old wine, new bottles? Va. JL & Tech, 9:13–13, 2004
Kshetri N. The simple economics of cybercrimes, IEEE Secur Priv, 4, pp. 33–39, 2006
Maloof, M. A. (Ed.), Machine learning and data mining for computer security: methods and applications. Springer Science Business Media, 2006
M. Cross and D. L. Shinder, Scene of the cybercrime.Syngress Pub., 2008
N. Dhanjani, B. Rios, and B. Hardin, Hacking: The Next Generation: The Next Generation. O’Reilly Media, Inc., 2009
Y Perwej, K Haq, U Jaleel, F Parwej, “Block ciphering in KSA, A major breakthrough in cryptography analysis in wireless networks”, International Transactions in Mathematical Sciences and Computer, India, ISSN-0974-5068, Volume 2, No. 2, Pages 369-385, July-December 2009
Fink, E., Sharifi, M., & Carbonell, J. G. “Application of machine learning and crowdsourcing to detection of cybersecurity threats”, In Proceedings of the US Department of Homeland Security Science Conference–Fifth Annual University Network Summit, Washington, DC., 2011
Greenfield VA, Pa. L. A framework to assess the harm of crim. Br J Crimi., vol. 53, pp. 864–885, 2013
T. Grant and S. Liles, On the military geography of cyberspace,'' Proc. Int. Conf. Inf. Warfa, p. 66, 2014
M. Chertoff and P. Rosenzweig. (Mar. 1, 2015). A Primer on Globally Harmonizing Internet Jurisdiction and Regulations, accessed on oct. 15, 2015.
Mathieu, T. & Guy, P., “A Framework for Guiding and Evaluating Literature reviews”, Communications of the Association for Inf. System, 37(6), pp 6, 2015
H. Lin. (May 15, 2015). Thinking About Nuclear and Cyber Con_ict: Same Questions, Different Answers, accessed on Oct. 15, 2015.
Hernández, A., Sanchez, V., Sánchez, G., Pérez, H., Olivares, J., Toscano, K., & Martinez, V. (2016, March). Security attack prediction based on user sentiment analysis of Twitter data. In 2016 IEEE international conference on industrial technology (ICIT) (pp. 610-617). IEEE.
Edwards B, Hofmeyr S, Forrest S. Hype and heavy tails: a closer look at data breaches. J Cyber secur 2016;2:3–14
Buczak, A. L., & Guven, E ,”A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp. 1153-1176, 2016
Van Slyke SR, Van Slyke S, Benson ML. The Oxford Handbook of White Collar Crime. Oxford University Press, 2016
Mittal, S., Das, P. K., Mulwad, V., Joshi, A., & Finin, T. ,”Cyber twitter: Using twitter to generate alerts for cyber security threats and vulnerabilities”, Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 860-867, 2016
Punter A, Coburn A, Ralph D. Evolving risk frameworks: modelling resilient business systems as interconnected networks. Centre for Risk Studies, University of Cambridge, 2016
Kennedy, Mike. ‘Equifax hack shows we need more regulation.’ Daily Herald. Infotrac Newsstand, 2017
Kemal Hajdarevic,Adna Kozic and Indira Avdgic,”Training Network Managers in Ethical Hacking Techniques to Manage Resource Starvation Attacks using GNS3 Simulator”, International Conference on Information, Communication and Automation Technologies (ICAT) , Sarajevo, Bosnia-Herzegovina , pp. 1-6 , Oct 26- 28, 2017
Teoh, T. T., Zhang, Y., Nguwi, Y. Y., Elovici, Y., & Ng, W. L. “Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perception (MLP) to obviate cyber security risk ”, 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp. 1790-1793, IEEE, 2017
Nguyen KD, Rosoff H, Richard SJ. Valuing information security from a phishing attack. In: International Conference on Applied Human Factors and Ergonomics. Cham: Springer, 2017
Lindsay, J. R. “Restrained by design: The political economy of cybersecurity”, Digital Policy, Regulation and Governance, 19, 493–514, 2017
Furnell S, Emm D. “The ABC of ransomware protection”, Comp. Fraud & Sec. (10), pp. 5-11, 2017
M. McGuire, Understanding the Growth of Cybercrime Economy. Bromium, 2018
Khan, R., & Urolagin, S. “Airline Sentiment Visualization, Consumer Loyalty Measurement and Prediction using Twitter Data”, International journal of advanced computer science and applications, 9(6), 380-388, 2018
Xingan Li. “Crucial Elements in Law Enforcement against Cybercrime.” Inte. Journal of Information Security Sci. , vol. 7, no. 3, pp. 140–158, 2018
Foroughi, F., & Luksch, P. “Data Science Methodology for Cybersecurity Projects”, arXiv preprint arXiv:1803.04219., 2018
Bergmann, M. C., Dreißigacker, A., von Skarczinski, B., & Wollinger, G. R. ,”Cyber-Dependent Crime Victimization: The Same Risk for Everyone? Cyberpsychology, Behavior, and Social Networking, 21(2), 84–90, 2018
Hernandez-Suarez, At al.., Social sentiment sensor in Twitter for predicting cyber-attacks using ℓ1 regularization. Sensors, 18(5), 1380, 2018
Verizon Enterprise.. Data Breach Investigations Report, 2018
Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. “On the effectiveness of machine and deep learning for cyber security”, 10th International Conference on Cyber Conflict (CyCon) pp. 371-390. IEEE, 2018
Healthcare Information and Management Systems Society.,HIMSS Cybersecurity Survey, 2018
Bhardwaj, P., Gautam, S., & Pahwa, P. “A novel approach to analyze the sentiments of tweets related to TripAdvisor”, Journal of Information and Optimization Sciences, 39(2), 591-605, 2018
Sarwar Sayeed, and Hector Marco-Gisbert. “Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack.” Applied Sciences , no. 9, p. 1788, 2019
Catherine D. at. al.“Handbook on Crime and Deviance. Handbooks of Sociology and Social Research, 2019
Ying-Yu Lin. “China Cyber Warfare and Cyber Force.” Tamkang Journal of InternationalmAffairs , vol. 22, no. 3, pp. 119–161, 2019
Kranenbarg, M. W., Holt, T. J. & van Gelder J.L. , “Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap, Deviant Behavior,40:1, pp. 40-55, 2019
Grace Odette Boussi,” A Proposed Framework for Controlling Cyber- Crime”, 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),IEEE, India, 2020
Priyanka Datta at. al.,” A Technical Review Report on Cyber Crimes in India”, International Conference on Emerging Smart Computing and Informatics (ESCI),IEEE, India, 2020
Altair, "Cyber security attacks on smart cities and associated mobile technologies", Procedia Computer Science, vol. 109, pp. 1086-1091, 2017
Nikhat Akhtar, Bedine Kerim, Yusuf Perwej, Anurag Tiwari, Sheeba Praveen,“A Comprehensive Overview of Privacy and Data Security for Cloud Storage”, International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Volume 08, Issue 5, Pages 113-152, September- October 2021, DOI: 10.32628/IJSRSET21852
C. S. Kruse, B. Frederick, T. Jacobson and D. K. Monticone, "Cybersecurity in healthcare: A systematic review of modern threats and trends", Tech. and Health Care, vol. 25, no. 1, pp. 1-10, 2017
L. Y. Chang and N. Coppel, "Building cyber security awareness in a developing country: lessons from Myanmar", Computers & Security, vol. 97, pp. 101959, 2020
Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Mohamed Hassan, Nikhat Akhtar, “The Internet-of-Things (IoT) Security: A Technological Perspective and Review” , International Journal of Scientific Research in Computer Science Engineering and Information Technology (IJSRCSEIT), Volume 5, Issue 1, Pages 462-482, February 2019, DOI: 10.32628/CSEIT195193
L. J. Janczewski and A. M. Colarik, Cyber warfare and cyber terrorism, Hershey:Information Science Reference, 2008
N. Choucri and D. Goldsmith, "Lost in cyberspace: harnessing the Internet international relations and global security", Bulletin of the Atomic Scientists, vol. 68, no. 2, pp. 70-77
Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data Jurisdiction”, International Journal of Engineering Research and Application (IJERA), Volume 8, Issue 1, (Part -I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
Yusuf Perwej, Md. Husamuddin, Majzoob K.Omer, Bedine Kerim, “A Comprehend the Apache Flink in Big Data Environments” , IOSR Journal of Computer Engineering (IOSR-JCE), USA, Volume 20, Issue 1, Ver. IV, Pages 48-58, 2018, DOI: 10.9790/0661-2001044858
C.M. Williams, R. Chaturvedi and K. Chakravarthy, "Cybersecurity Risks in a Pandemic", Journal of Medical Internet Res., vol. 22, no. 9, pp. 23692, 2020
Asif Perwej “The Impact of Pandemic Covid-19 On The Indian Banking System”, International Journal Of Recent Scientific Research (IJRSR), ISSN
–3031, Volume. 11, Issue 10 (B), Pages 39873-39883, 28th October, 2020
S. Wu, Y. Chen, M. Li, X. Luo, Z. Liu and L. Liu, "Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools", EEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 874-887, 2020
S. Aftergood, "Cybersecurity. The Cold war online", Nature, vol. 547, no. 7661, pp. 30, 2017
Yusuf Perwej, Shaikh Abdul Hannan, Firoj Parwej, Nikhat Akhtar , “A Posteriori Perusal of Mobile Computing”, International Journal of Computer Applications Technology and Research (IJCATR), , Volume 3, Issue 9, Pages 569 - 578, September 2014, DOI: 10.7753/IJCATR0309.1008
M. Schwenk Jensen, J. Gruschka and N. Iacono, "On technical security issues in Cloud", IEEE International Conference on Cloud Computing, pp. 109-16, 2009
Yuya Jeremy Ong, Mu Qiao, Ramani Routray and Roger Raphael, "Context-Aware Data Loss Prevention for Cloud Storage Services", 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
X. Jin, W. Sun, Y. Liang, J. Guo and Z. Xie, "Design and implementation of intranet safety monitoring platform for Power secondary system", Automation of Electric Power System, pp. 99-104, Aug. 2011
Yusuf Perwej, Kashiful Haq, Firoj Parwej, M. M. Mohamed Hassan ,“ The Internet of Things (IoT) and its Application Domains”, International Journal of Computer Applications (IJCA) ,USA , ISSN 0975 – 8887, Volume 182, No.49, Pages 36- 49, April 2019,DOI: 10.5120/ijca2019918763
Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “An Empirical Analysis of Web of Things (WoT)”, International Journal of Advanced Research in Computer Science (IJARCS), Volume 10, No. 3, Pages 32-40, 2019, DOI: 10.26483/ijarcs.v10i3.6434
Nikhat Akhtar, Yusuf Perwej, “The Internet of Nano Things (IoNT) Existing State and Future Prospects”, for published in the GSC Advanced Research and Reviews (GSCARR), e-ISSN: 2582-4597, Volume 5, Issue 2, Pages 131-150, November 2020, DOI: 10.30574/gscarr.2020.5.2.0110
Nikhat Akhtar, Saima Rahman, Halima Sadia, Yusuf Perwej, “A Holistic Analysis of Medical Internet of Things (MIoT)”, Journal of Information and Computational Science (JOICS), ISSN: 1548 - 7741, Volume 11, Issue 4, Pages 209 - 222, April 2021, DOI: 10.12733/JICS.2021/V11I3.535569.31023
S. Kowtha, L. A. Nolan and R. A. Daley, "Cyber security operations center characterization model and analysis", Proc. IEEE Conf. Technol. Homeland Secur. (HST), pp. 470-475, Nov. 2012
Lital Asher-Dothan, Seven essential elements of modern endpoin t security, March 2018, [online] Available: https://www.cybereason.com/blog/7-elements-of-modern-endpoint-security
Yusuf Perwej, “The Ambient Scrutinize of Scheduling Algorithms in Big Data Territory”, International Journal of Advanced Research (IJAR), ISSN 2320-5407, Volume 6,Issue 3, Pages 241-258, March 2018, DOI: 10.21474/IJAR01/6672
F. Pasqualetti, F. Dorfler and F. Bullo, "Attack detection and identification in cyber-physical systems", IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715-2729, 2013
Yusuf Perwej, Bedine Kerim, Mohmed Sirelkhtem Adrees, Osama E. Sheta, “An Empirical Exploration of the Yarn in Big Data”, International Journal of Applied Information Systems (IJAIS) – ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA, Volume 12, No.9, Pages 19-29, December 2017, DOI: 10.5120/ijais2017451730
Yusuf Perwej, Nikhat Akhtar, Firoj Parwej, “A Technological Perspective of Blockchain Security”, International Journal of Recent Scientific Research (IJRSR), ISSN: 0976-3031, Volume 9, Issue 11, (A), Pages 29472 – 29493, November 2018, DOI: 10.24327/ijrsr.2018.0911.2869
Asif Perwej, Dr. Kashiful Haq, Dr. Yusuf Perwej, “Blockchain and its Influence on Market”, International Journal of Computer Science Trends and Technology (IJCST), ISSN 2347 – 8578, Volume 7, Issue 5, Pages 82- 91, Sep – Oct 2019, DOI: 10.33144/23478578/IJCST-V7I5P10
Yusuf Perwej, “A Pervasive Review of Blockchain Technology and Its Potential Applications”, Open Science Journal of Electrical and Electronic Engineering (OSJEEE), New York, USA, Volume 5, No. 4, Pages 30 - 43, October, 2018
D. Grpoup, Cyber Crime: New Challenge to Mankind Society Introduction to the Nature of Cyber Crime and its Investigation Process, January 2011
K. K. R. Choo, "The cyber threat landscape", Challenges and future research directions. Computers & Security, vol. 30, no. 8, pp. 719-731, 2011
Mahmoud Khonji, Youssef Iraqi and Andrew Jones, "Literature Review on Phishing Detection", Institute of Electrical and Electronics Engineers Communication Surveys and Tutorials, vol. 15, no. 04, 2013
Lee, K. Kim, H. Lee and M. Jun, "A study on realtime detecting smishing on cloud computing environments" in Advanced Multimedia and Ubiquitous Engineering, Berlin, Heidelberg:Springer, pp. 495-501, 2016
N. Thamsirarak, T. Seethongchuen and P. Ratanaworabhan, "A Case for Malware that Make Antivirus Irrelevant" in , Thailand:IEEE, 2015
Ali, "Ransomware: A research and a personal case study of dealing with this nasty malware", Issues in Informing Science and Information Technology Education, vol. 14, pp. 87-99, 2017
M. Tehranipoor and R. Koushanfar, "A survey of hardware Trojan taxonomy and detection", IEEE design & test of computers, vol. 27, no. 1, 2010
M. Choraś, R. Kozik, D. Puchalski , W. Hołubowicz, "Correlation approach for sql injection attacks detection", Inte. Joint Confe. CISIS’12-ICEUTE´ 12-SOCO´ Special Sessions, pp. 177-185, 2013
Y. Shin, L. Williams and T. Xie, "Sqlunitgen: Sql injection testing using static and dynamic analysis", The 17th IEEE International Symposium on Software Reliability Engineering (ISSRE 2006), 2006
S. T. Zargar, J. Joshi and D. Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks", IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069
Bin Xiao, Wei chen, Yanxiang He, Edwin Hsing and Mean Sha, "An Active Detecting Method against SYN Flooding attack", proceedings of the 11th International conference on Parallel and Distributed Systems ICPADS2005, pp. 709-715, July 2005
Raymond, D.R. and S.F. Midkiff, Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. Pervasive Computing, IEEE, 2008. 7(1): p. 74-81
Abdalla Wasef Marashdih and Zarul Fitri Zaaba, "Cross Site Scripting: Detection Approaches in Web Application", International Journel of Advanced Computer Science and appl., vol. 7, no. 10, 2016
Huajie Xu, Xiaoming Hu and Dongdong Zhang, "A XSS defensive scheme based on behavior certification", Applied Mechanics and Materials, vol. 241–244, pp. 2365-2369, 2013
M. Conti, N. Dragoni and V. Lesyk, "A survey of man in the middle attacks", IEEE Communications Surveys & Tut., vol. 18, no. 3, pp. 2027-2051, 2016
K. Zeng, D. Wu, A. Chan and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks", INFOCOM 2010 Proceedings IEEE, pp. 1-9, 2010
Prof. Kameswara Rao Poranki, Dr. Yusuf Perwej, Dr. Asif Perwej, ”The Level of Customer Satisfaction related to GSM in India “, published by The TIJ's Research Journal of Science & IT Management RJSITM, International Journal's-Research Journal of Science & IT Management of Singapore, Singapore, Volume 04,Number: 03, Pages 29-36 , 2015
Yusuf Perwej , Firoj Parwej, “A Neuroplasticity (Brain Plasticity) Approach to Use in Artificial Neural Network”, International Journal of Scientific & Engineering Research (IJSER), France , ISSN 2229 – 5518, Volume 3, Issue 6, Pages 1- 9, June 2012, DOI: 10.13140/2.1.1693.2808
X. Li, H. Wang, H.-N. Dai, Y. Wang and Q. Zhao, "An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things", Mobile Information Systems, vol. 2016, 2016
Yusuf Perwej, Majzoob K. Omer, Osama E. Sheta, Hani Ali M. Harb, Mohmed S. Adrees, “The Future of Internet of Things (IoT) and Its Empowering Technology” , International Journal of Engineering Science and Computing (IJESC), Volume 9, Issue No.3, Pages 20192– 20203, March 2019
Adnan Amin at. Al. ,” Classification of cyber-attacks based on rough set theory”, First International Conference on Anti-Cybercrime (ICACC), IEEE, Saudi Arabia 2015
R. Sabillon, J. Cano, V. Cavaller and J. Serra, "Cybercrime and Cybercriminals: A Comprehensive Study", International Journal of Computer Networks and Comm. Security, vol. 4, no. 6, pp. 165-176, 2016
Al-Mushayt O., Haq Kashiful, Yusuf Perwej, “Electronic-Government in Saudi Arabia”, a Positive Revolution in the Peninsula”, International Transactions in Applied Sciences, India, ISSN-0974-7273, Volume 1, Number 1, Pages 87-98, July-December 2009
Raymond Wu and Masayuki Hisada, "Static and Dynamic Analysis for Web Security in industry Applications", International Journal of Electronic Security and Digital forensics Inder Science, vol. 3, no. 2, pp. 138-150, 2010
Zhu Huafei, "Towards a Theory of Cyber Security Assessment in the Universal Composable Framework", Information Science and Engineering (ISISE) 2009 Second International Symposium on, pp. 203-207, 26–28 Dec. 2009
T. Chmielecki, P. Cholda, P. Pacyna, P. Potrawka, N. Rapacz, R. Stankiewicz, et al., "Enterprise-oriented cybersecurity management", Computer Science and Information Systems (FedCSIS) 2014 Federated Conference on, pp. 863-870, 7–10 Sept. 2014
Bela Genge, Piroska Haller and Istvan Kiss, "A framework for designing resilient distributed intrusion detection systems for critical infrastructures", International Journal of Critical Infrastructure Protection, vol. 15, pp. 3-11, 2016,
F. Setiadi, P. H. Putra, Y. G. Sucahyo and Z. A. Hasibuan, "Determining components of national cyber security framework using Grounded Theory", Second Int. Conf. Informatics Comput., pp. 1-6, 2017
Y. Nugraha, S. Member and I. A. N. Brown, "An Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirements", IEEE Transactions On Emerging Topics in Computing, vol. 4, no. 1, pp. 47-59, 2016
Z. A. Soomro, M. H. Shah and J. Ahmed, "Information security management needs more holistie approach: A literature review", International Journal of Information Management, vol. 36, no. 2, pp. 215-225, 2016
Z. Trabelsi, K. Hayawi, A. Braiki and S. Mathew, Network Attacks and Defenses: A Hands-on Approach, Boca Raton, Florida:CRC Press, 2013
Brian Komar, Ronald Beekelaar and Joern Wettern, Firewalls for Dummies, pp. 10, August 2001
Imran Ijaz, "Design and Implementation of PKI (For Multi Domain Environment)," Inter. Journal of Com. Theory and Eng. vol. 4, no. 4, pp. 505-509, 2012
C. Weissman, "Security penetration testing guideline" in , US:Handbook for the Computer Security Certification of Trusted Systems, Center for Secure Information Technology, Naval Research Laboratory (NRL), pp. 1-66, 1993
Roumen Trifonov, Georgi Manolov, Radoslav Yoshinov and Galya Pavlova, "A survey of artificial intelligence for enhancing the information security", International Journal of Development Research, vol. 7, no. 11, pp. 16866-16872, 2017
Pranggono and A. Arabo, "COVID-19 pandemic cybersecurity issues", Internet Technology Letter (Wiley), pp. 1-6, 2020
Yusuf Perwej, Majzoob K. Omer, Osama E. Sheta, Hani Ali M. Harb, Mohmed S. Adrees, “The Future of Internet of Things (IoT) and Its Empowering Technology”, International Journal of Engineering Science and Computing (IJESC), ISSN : 2321- 3361, Volume 9, Issue No.3, Pages 20192– 20203, 2019
R. Doshi, N. Apthorpe and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices", 2018 IEEE Security and Privacy Workshops (SPW), pp. 29-35, 2018
N. Scaife, P. Traynor K. Butler, "Making sense of the ransomware mess planning a sensible path forward)", IEEE Potentials, vol. 36, no. 6, pp. 28-31, 2017
Bag, S. Ruj and K. Sakurai, "Bitcoin block withholding attack: Analysis and mitigation", IEEE Transactions on Information Forensics and Security, vol. 12, no. 8, pp. 1967-1978, 2017
Yusuf Perwej, Ashish Chaturvedi, “Machine Recognition of Hand Written Characters using Neural Networks”, International Journal of Computer Applications (IJCA), USA, ISSN 0975 – 8887, Volume 14, No. 2, Pages 6- 9, January 2011, DOI: 10.5120/1819-2380
Biometric Systems: Technology Design and Performance Evaluation, Springer Verlag, 2005
Tudzarov , T. Janevski, "Design of 5G Mobile Architecture" International Journal of Communication Networks and Information Security, Vol. 3, No. 2, August 2011
Yusuf Perwej, Kashiful Haq, Uruj Jaleel, Sharad Saxena, “Some Drastic Improvements Found in the Analysis of Routing Protocol for the Bluetooth Technology Using Scatternet”, Special Issue on The International Conference on Computing, Communications and Information Technology Applications (CCITA-2010), Ubiquitous Computing and Communication Journal (UBICC), Seoul, South Korea, ISSN Online: 1992-8424, Volume CCITA-2010, Number 5 , Pages 86-95, 2010
Nikhat Akhtar, Devendera Agarwal, “A Literature Review of Empirical Studies of Recommendation Systems”, International Journal of Applied Information Systems (IJAIS), ISSN: 2249-0868, Foundation of Computer Science FCS, New York, USA, Volume 10, No.2, Pages 6 – 14, December 2015, DOI: 10.5120/ijais2015451467
Nikhat Akhtar, Devendera Agarwal, “An Influential Recommendation System Usage for General Users”, Communications on Applied Electronics (CAE), ISSN : 2394-4714, Foundation of Computer Science, New York, USA, Vol. 5, No.7, Pages 5 – 9, 2016, DOI: 10.5120/cae2016652315
Nikhat Akhtar, Devendra Agarwal, “A Survey of Imperfection of Existing Recommender System for Academic Fraternity”, IOSR Journal of Computer Engineering (IOSR-JCE), p-ISSN: 2278-8727 , Volume 20 , Issue 3, Pages 08-15, Ver.III(May – June. 2018), DOI: 10.9790/0661-2003030815
Qiang Tang and Jun Wang. “Privacy preserving context-aware recommender systems: Analysis and new solutions”, In G. Pernul, P. Y. A. Ryan, and E. R. Weippl, editors, Computer Security ESORICS 2015, volume 9327, pages 101–119. Springer, 2015
Nikhat Akhtar, “A Model Based Research Material Recommendation System For Individual Users”, Transactions on Machine Learning and Artificial Intelligence (TMLAI), Society for Science and Education, United Kingdom (UK), ISSN 2054-7390, Vol. 5, Issue 2, Pages 1 - 8, March 2017, DOI: 10.14738/tmlai.52.2842
Arjan Jeckmans, Andreas Peter, and Pieter Hartel. “Efficient privacy-enhanced familiarity based recommender system”, In Computer Security–ESORICS 2013, pages 400–417. Springer, 2013
Nikhat Akhtar, Devendera Agarwal, “An Efficient Mining for Recommendation System for Academics”, International Journal of Recent Technology and Engineering (IJRTE), ISSN 2277-3878 (online), SCOPUS, Volume-8, Issue-5, Pages 1619-1626, 2020, DOI: 10.35940/ijrte.E5924.018520
Nikhat Akhtar, “Perceptual Evolution for Software Project Cost Estimation using Ant Colony System”, International Journal of Computer Applications (IJCA) USA, Volume 81, No.14, Pages 23 – 30, 2013, DOI: 10.5120/14185-2385
ENISA threat landscape report 2018: 15 Top Cyber-Threats and Trends, 2019, [online] Available: https://doi.org/10.2824/
Copyright (c) 2021 International Journal of Scientific Research and Management
This work is licensed under a Creative Commons Attribution 4.0 International License.