To see the other types of publications on this topic, follow the link: Cyber-defense authentication mechanism.

Journal articles on the topic 'Cyber-defense authentication mechanism'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber-defense authentication mechanism.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Li, Bo, Xin Jin, Tingjie Ba, Tingzhe Pan, En Wang, and Zhiming Gu. "Deceptive Cyber-Resilience in PV Grids: Digital Twin-Assisted Optimization Against Cyber-Physical Attacks." Energies 18, no. 12 (2025): 3145. https://doi.org/10.3390/en18123145.

Full text
Abstract:
The increasing integration of photovoltaic (PV) systems into smart grids introduces new cybersecurity vulnerabilities, particularly against cyber-physical attacks that can manipulate grid operations and disrupt renewable energy generation. This paper proposes a multi-layered cyber-resilient PV optimization framework, leveraging digital twin-based deception, reinforcement learning-driven cyber defense, and blockchain authentication to enhance grid security and operational efficiency. A deceptive cyber-defense mechanism is developed using digital twin technology to mislead adversaries, dynamical
APA, Harvard, Vancouver, ISO, and other styles
2

Shradha Pandule, Akshada Ringe, Jaid Sayyed, and Prof. S. C. Puranik. "Keystroke Tracking-Robust System with Dual-Keypad Security." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 05 (2025): 2098–102. https://doi.org/10.47392/irjaeh.2025.0306.

Full text
Abstract:
The development of an advanced authentication mechanism designed to mitigate the increasing risk of keylogging attacks, a prevalent cyber threat that captures keystrokes to steal sensitive information. Traditional authentication methods relying on keyboard input are particularly vulnerable to such attacks. To address this, a novel security framework is introduced, combining two innovative components: a dual-keypad input system and a visual authentication protocol. The dual-keypad system employs two distinct input interfaces—a physical keypad and a virtual keypad—each handling separate aspects
APA, Harvard, Vancouver, ISO, and other styles
3

Pandule, Shradha. "Implementation Towards Enhanced Visual Proof of Identity: Keystroke Tracking-Robust System with Dual-Keypad Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47627.

Full text
Abstract:
Abstract: - The project focuses on developing an advanced authentication mechanism to counteract the growing threat of keylogging attacks. Keylogging, a type of cyber-attack that captures keystrokes to steal sensitive information, poses a significant risk to traditional authentication methods that rely on keyboard input. This project introduces a novel security approach combining two key innovations: a dual-keypad input system and a visual authentication protocol. The dual-keypad system consists of two separate input keypad (Normal Keypad and Virtual Keypad), each responsible for a different a
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Mrs Priyanka. "Encrypted Chat Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35388.

Full text
Abstract:
In today's cyber landscape, the protection of digital communication channels stands as a paramount concern. This abstract dissects the cyber resilience strategies underpinning the development of secure chat applications, with a particular focus on user interface design using Jetpack Compose and encryption integration leveraging Kotlin. The examination commences with an in-depth analysis of the cyber defence mechanisms ingrained within chat interfaces crafted through Jetpack Compose, the cutting-edge toolkit tailored for native Android UI construction. By meticulously adhering to Material Desig
APA, Harvard, Vancouver, ISO, and other styles
5

Baek, Youngmi, and Seongjoo Shin. "CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks." Sensors 22, no. 7 (2022): 2636. http://dx.doi.org/10.3390/s22072636.

Full text
Abstract:
Automotive cyber-physical systems are in transition from the closed-systems to open-networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have become essential to connect to inter-vehicle networks through the various rich interfaces. Newly exposed security concerns derived from this requirement may cause in-vehicle networks to pose threats to automotive security and driver’s safety. In this paper, to ensure a high level of security of the in-vehicle network for automotive CPS, we propose a novel lightweight and practical cyber defense platform, referred
APA, Harvard, Vancouver, ISO, and other styles
6

Vijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.

Full text
Abstract:
Architectural changes are happening in the modern industries due to the adaption and the deployment of ‘Internet of Things (IoT)’ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable ‘Next Generation Cyber Security Architecture (NCSA)’ is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the processes of excha
APA, Harvard, Vancouver, ISO, and other styles
7

Rajaa Ahmed Ali. "Enhancing Hand Vein Authentication: Gray Wolf Optimization Mitigates Data Poisoning Attacks." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 1101–9. https://doi.org/10.52783/jisem.v10i34s.5914.

Full text
Abstract:
Nowadays most vital organizations depend on biometric systems to protect their resources and authenticate their customers. Hand vein is one of the biometrics which used for more critical infrastructures. In this paper a hand vein pattern-based biometric authentication system is proposed. The suggested system is designed with attack phase and defense phase. In attack phase, hand veins are preprocessed, and features extracted using PCA-net. These features are clustered using Gray Wolf Optimization (GWO). Lastly, hand veins are poisoned using label flipping mechanism. In defense phase, poisoned h
APA, Harvard, Vancouver, ISO, and other styles
8

C., Vijayakumaran, Muthusenthil B., and Manickavasagam B. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 387–95. https://doi.org/10.11591/ijece.v10i1.pp387-395.

Full text
Abstract:
Architectural changes are happening in the modern industries due to the adaption and the deployment of „Internet of Things (IoT)" for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable „Next Generation Cyber Security Architecture (NCSA)" is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the proces
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Manmeet Mahinderjit, Richard Frank, and Wan Mohd Nazmee Wan Zainon. "Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): 1658–68. http://dx.doi.org/10.11591/eei.v10i3.3028.

Full text
Abstract:
The growth of technologies; infrastructures and platforms with less or no security protection in emerging big data and internet of things (IoT) trends increase the likelihood of cybercrime attacks. With the rise of coronavirus disease-2019 (Covid-19) pandemic towards mankind, more cybercrimes are designed to penetrate one’s cognitive mind in revealing sensitive details. In this paper; an exploration of cybercrime threats in Southeast Asia country; Malaysia from year 2008 up to 2020 and its hike trends and impacts will be discussed. An investigation revolving the study of cyber-criminology and
APA, Harvard, Vancouver, ISO, and other styles
10

Manmeet, Mahinderjit Singh, Frank Richard, and Mohd Nazmee Wan Zainon Wan. "Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): pp. 1658~1668. https://doi.org/10.11591/eei.v10i3.3028.

Full text
Abstract:
The growth of technologies; infrastructures and platforms with less or no security protection in emerging big data and internet of things (IoT) trends increase the likelihood of cybercrime attacks. With the rise of coronavirus disease-2019 (Covid-19) pandemic towards mankind, more cybercrimes are designed to penetrate one’s cognitive mind in revealing sensitive details. In this paper; an exploration of cybercrime threats in Southeast Asia country; Malaysia from year 2008 up to 2020 and its hike trends and impacts will be discussed. An investigation revolving the study of cyber-criminolog
APA, Harvard, Vancouver, ISO, and other styles
11

Yermoshyn, Valerii. "CONTROL OF CYBER SECURITY PARAMETERS AS A MECHANISM FOR EVALUATING THE EFFECTIVENESS OF PROTECTION AND FORECASTING THE SITUATION." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 51–58. http://dx.doi.org/10.28925/2663-4023.2024.25.5158.

Full text
Abstract:
The current legal framework in Ukraine defines a set of cybersecurity measures and the need to plan their further development, which allows us to formulate and describe a general approach to cybersecurity in the form of a systematic process. At the same time, there is a need to form specific cybersecurity parameters that allow quantifying cybersecurity not only as a management process, but also as a real protection system with its own peculiarities and disadvantages. Based on the author's experience, an approach to the formation of cybersecurity parameters as a mechanism for assessing the effe
APA, Harvard, Vancouver, ISO, and other styles
12

Ranga, Premsai. "Mitigating Cyber Attack With Ai Driven Identity And Access Management In Modern Networks." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 3 (2022): 1–12. https://doi.org/10.5281/zenodo.14281882.

Full text
Abstract:
In the realm of financial transactions, ensuring the security and integrity of sensitive data is of paramount importance. The rapid digitization of financial services has led to an increased risk of malicious attacks, including data breaches, fraud, and unauthorized access. Detecting and mitigating these attacks in real time is a critical challenge. This paper introduces a comprehensive Identity and Access Control (IAC) framework designed to safeguard financial data in the context of online transactions. The framework combines mutual authentication, secure communication protocols, and advanced
APA, Harvard, Vancouver, ISO, and other styles
13

Gopalakrishnan Mahadevan. "Cybersecurity in Banking and Financial Software Solutions." Economic Sciences 21, no. 1 (2025): 334–50. https://doi.org/10.69889/0btn6w55.

Full text
Abstract:
The rapid evolution of digital banking and financial transactions has brought unprecedented convenience, yet it has also exposed institutions and consumers to growing cyber threats. Cyberattacks, including data breaches, ransomware, phishing, and denial-of-service attacks, have significantly increased, targeting vulnerabilities in financial systems. This paper explores the cybersecurity landscape in banking and financial software solutions, emphasizing the critical need for robust security frameworks. Key concerns include unencrypted data, unreliable third-party services, and the rising cost o
APA, Harvard, Vancouver, ISO, and other styles
14

Harini, Mrs K. "Command and Control Traffic Detection and Mitigation in Botnet Driven Networks." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1038–43. https://doi.org/10.22214/ijraset.2025.67486.

Full text
Abstract:
In the evolving landscape of cybersecurity, the threat of hackers exploiting system vulnerabilities remains a persistent challenge. The cyber kill chain outlines the series of steps attackers follow to infiltrate and compromise systems. A critical phase in this chain involves the establishment of a Command and Control (C2) server, through which malicious actors maintain control over the compromised systems and transfer beacons to exfiltrate information. This project introduces a novel technique aimed at disrupting the cyber kill chain by detecting and mitigating the establishment of C2 paths b
APA, Harvard, Vancouver, ISO, and other styles
15

Feilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.

Full text
Abstract:
In an increasingly interconnected world, the convergence of power system networks and biometric-based biomedical applications presents unique challenges for data protection and privacy. This research endeavors to conceptualize and design an intelligent countermeasure system that serves as a robust defense mechanism for enhancing security in this complex ecosystem. The proposed system incorporates biometric authentication techniques to fortify user access controls, implements advanced encryption methods for safeguarding sensitive biomedical data, and intrusion detection and prevention mechanism
APA, Harvard, Vancouver, ISO, and other styles
16

Princess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.

Full text
Abstract:
The rapid growth of the fintech industry has led to an increased reliance on digital financial transactions, which simultaneously presents significant cybersecurity risks. This abstract explores the potential of combining blockchain technology with advanced cybersecurity protocols to create a dual-layered approach to securing financial transactions and protecting customer data in fintech applications. Blockchain, with its decentralized and immutable nature, offers inherent security benefits, making it an ideal foundation for enhancing the integrity of financial transactions. Each transaction r
APA, Harvard, Vancouver, ISO, and other styles
17

Mamidi, Sundeep Reddy. "The Role of AI and Machine Learning in Enhancing Cloud Security." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 403–17. http://dx.doi.org/10.60087/jaigs.v3i1.161.

Full text
Abstract:
Cloud computing has transformed how organizations store, process, and manage data, offering unparalleled flexibility and scalability. However, the rise in cyber threats presents significant challenges to maintaining robust cloud security. This chapter explores the crucial role that Artificial Intelligence (AI) and Machine Learning (ML) play in enhancing cloud security. By leveraging AI and ML capabilities, organizations can proactively detect, mitigate, and respond to evolving cyber threats, ultimately strengthening their cloud infrastructure. AI-driven techniques enable security systems to re
APA, Harvard, Vancouver, ISO, and other styles
18

Babajide Tolulope Familoni. "CYBERSECURITY CHALLENGES IN THE AGE OF AI: THEORETICAL APPROACHES AND PRACTICAL SOLUTIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 703–24. http://dx.doi.org/10.51594/csitrj.v5i3.930.

Full text
Abstract:
In the ever-evolving landscape of cybersecurity, the proliferation of artificial intelligence (AI) technologies introduces both promising advancements and daunting challenges. This paper explores the theoretical underpinnings and practical implications of addressing cybersecurity challenges in the age of AI. With the integration of AI into various facets of digital infrastructure, including threat detection, authentication, and response mechanisms, cyber threats have become increasingly sophisticated and difficult to mitigate. Theoretical approaches delve into understanding the intricate inter
APA, Harvard, Vancouver, ISO, and other styles
19

Yogi, Manas Kumar, and Dr A. S. N. Chakravarthy. "Privacy elasticity: building resilient data protection for cyber physical systems." Journal of Electronics,Computer Networking and Applied Mathematics, no. 51 (June 30, 2025): 1–15. https://doi.org/10.55529/jecnam.51.1.15.

Full text
Abstract:
In an increasingly interconnected world, cyber-physical systems play a pivotal role in our daily lives, spanning industries from healthcare to transportation and smart cities.With the growing use of smart devices, the privacy concerns are also increasing manifold.This research work depicts novel viewpoints on recommendations for privacy aspects within the eco-systems of cyber-physical systems, aiming to address these critical challenges. The developing nature of privacy design puts impact on non-static authorization, facilitating fine-grained access control depending on real-time situations. E
APA, Harvard, Vancouver, ISO, and other styles
20

Kalyan Manohar, Immadisetti, Dadisetti Vishnu Datta, and Lekshmi S. Raveendran. "Website Vulnerability Scanning System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43079.

Full text
Abstract:
With the increasing reliance on web applications for business and personal use, ensuring website security has become a critical concern. Cyber threats such as SQL injection, cross-site scripting (XSS), malware infections, and unauthorized access pose significant risks to websites, leading to data breaches and service disruptions. This project aims to develop a comprehensive website security scanner that systematically identifies vulnerabilities and potential security risks.The proposed system integrates automated vulnerability scanning, penetration testing techniques, and real-time monitoring
APA, Harvard, Vancouver, ISO, and other styles
21

Soundararajan, Balaji. "Implementing Payment System Security: A Technical Deep Dive." International Journal of Multidisciplinary Research and Growth Evaluation. 3, no. 5 (2022): 615–21. https://doi.org/10.54660/.ijmrge.2022.3.5.615-621.

Full text
Abstract:
The rapid transition from cash-based to digital payment systems underscores the critical need for robust security frameworks to safeguard sensitive financial data and maintain public trust. This paper explores the foundational principles of payment system security that includes data integrity, confidentiality, and availability and examines key technologies and methodologies designed to mitigate risks, including encryption, tokenization, and authentication mechanisms. Symmetric and asymmetric encryption techniques are analyzed for their roles in securing transactional data, while tokenization i
APA, Harvard, Vancouver, ISO, and other styles
22

Sathyananda Kumar Pamarthy. "Implementing Robust Data Privacy and Security in Modern ERP Systems: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2360–65. https://doi.org/10.32628/cseit251112258.

Full text
Abstract:
Enterprise Resource Planning (ERP) systems have become crucial components in modern business operations, demanding robust security measures to protect sensitive data and maintain operational integrity. This comprehensive article explores the multifaceted aspects of ERP security, focusing on advanced access control mechanisms, data protection strategies, and compliance requirements. The implementation of Role-Based Access Control (RBAC), multi-factor authentication, and biometric verification has significantly enhanced security protocols while improving operational efficiency. Data protection m
APA, Harvard, Vancouver, ISO, and other styles
23

Bai, Zhaoyue, Hui Miao, Junfeng Miao, Nan Xiao, and Xiaoxue Sun. "Artificial Intelligence-driven Cybersecurity Applications and Challenges." Innovative Applications of AI 2, no. 2 (2025): 26–33. https://doi.org/10.70695/aa1202502a09.

Full text
Abstract:
In the era of big data, novel cyber attack methods are emerging endlessly. Traditional cybersecurity defense measures have become insufficient to counter these new threats, while the rapid development of artificial intelligence (AI) technology provides critical solutions for cybersecurity defense systems. The application of AI in the field of cybersecurity is primarily manifested in the following aspects. Firstly, intelligent threat monitoring and intrusion detection systems enable real-time indentification of anomalous behaviors. Secondly, machine learning-based automated defense and response
APA, Harvard, Vancouver, ISO, and other styles
24

Manne, Tirumala Ashish Kumar. "Enhancing Security in Cloud Computing Using Artificial Intelligence (AI) Techniques." International Journal of Computing and Engineering 3, no. 1 (2022): 45–53. https://doi.org/10.47941/ijce.2764.

Full text
Abstract:
Cloud computing has revolutionized data storage, processing, and accessibility, but it also introduces significant security challenges, including data breaches, insider threats, unauthorized access, and distributed denial-of-service (DDoS) attacks. Traditional security approaches, such as rule-based firewalls and static access control mechanisms, struggle to counter increasingly sophisticated cyber threats. Artificial Intelligence (AI) has emerged as a transformative solution, leveraging machine learning (ML), deep learning (DL), and natural language processing (NLP) to enhance cloud security.
APA, Harvard, Vancouver, ISO, and other styles
25

Al-Omari, Ahmad H., Ahmad Ghazi Alshanty, Ayoub Alsarhan, and Saifullah A. Omari. "OTP security in wallet systems: A vulnerability assessment." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 2356–71. https://doi.org/10.53894/ijirss.v8i2.5691.

Full text
Abstract:
This study investigates One-Time Password (OTP) vulnerabilities in digital wallet systems, employing penetration testing and manual security evaluations (via Burp Suite) to assess risks across authentication, fund transfers, IVR verification, and token lifecycle management. Critical gaps including OTP bypass (e.g., header manipulation, token reuse), unauthorized beneficiary additions, brute-force attacks on weak pincodes, and expired OTP exploitation, highlight systemic flaws in server-side validation and API security. Classified using CVSS and ISO/IEC 27005:2018 frameworks, these vulnerabilit
APA, Harvard, Vancouver, ISO, and other styles
26

Lakhani, Rishit. "Cybersecurity Threats in Internet of Things (IoT) Networks: Vulnerabilities and Defense Mechanisms." International Journal of Engineering and Computer Science 12, no. 11 (2023): 25965–80. http://dx.doi.org/10.18535/ijecs/v12i11.4779.

Full text
Abstract:
In fact, the mushrooming development of IoT has reshaped industries and everyday life in connecting devices, networks, and systems. Accompanying this phenomenal growth are formidable challenges related to cybersecurity. The major reasons why IoT networks are more susceptible to a variety of cyber threats are the limited computational resources of devices, a lack of standardized security protocols, and the large-scale interconnectedness of devices. This paper throws light on some of the major cybersecurity threats to IoT networks, such as device vulnerabilities, network-based attacks, and data
APA, Harvard, Vancouver, ISO, and other styles
27

Matey, Preeti. "Combining Disaster Recovery, Backup Security, and Compliance: Best Practices for Encryption, RBAC, and MFA." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41891.

Full text
Abstract:
In the current digital age, ensuring the security of disaster recovery (DR) systems and backup data has become a critical concern for organizations focused on safeguarding their assets and maintaining seamless business operations. This paper explores the integration of essential security practices—encryption, Role-Based Access Control (RBAC), and Multi-Factor Authentication (MFA)—into disaster recovery and backup security frameworks. These technologies work synergistically to enhance data protection, mitigate unauthorized access risks, and ensure regulatory compliance. Encryption protects data
APA, Harvard, Vancouver, ISO, and other styles
28

Pedreira, Vítor, Daniel Barros, and Pedro Pinto. "A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead." Sensors 21, no. 15 (2021): 5189. http://dx.doi.org/10.3390/s21155189.

Full text
Abstract:
The concepts brought by Industry 4.0 have been explored and gradually applied.The cybersecurity impacts on the progress of Industry 4.0 implementations and their interactions with other technologies require constant surveillance, and it is important to forecast cybersecurity-related challenges and trends to prevent and mitigate these impacts. The contributions of this paper are as follows: (1) it presents the results of a systematic review of industry 4.0 regarding attacks, vulnerabilities and defense strategies, (2) it details and classifies the attacks, vulnerabilities and defenses mechanism
APA, Harvard, Vancouver, ISO, and other styles
29

Tongesai, Machakaire. "Enhancing MANETs for military applications: A comprehensive review of innovations, challenges, and research gaps." i-manager’s Journal on Wireless Communication Networks 13, no. 2 (2025): 46. https://doi.org/10.26634/jwcn.13.2.22063.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) have become indispensable in modern military operations; they provide decentralized, adaptive, and resilient communication frameworks in dynamic battlefield environments. This paper presents a comprehensive review of MANET innovations, challenges, and research gaps, focusing on advancements in security mechanisms, energy efficiency, routing optimization, interoperability, and AI-driven management systems. MANETs enhance military communication by enabling self-forming and self-healing networks, improving situational awareness, tactical coordination, and mission s
APA, Harvard, Vancouver, ISO, and other styles
30

SAI VENKATA SATHYA PAVAN SAHIL,, YEKOLLU. "IoT Security: Intrusion Detection and Mitigation." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem03137.

Full text
Abstract:
Abstract— Businesses in almost every industry have been redesigned for smarter communication and automation through investments in the Internet of Things (IoT). However, this technological change has brought about scale of cybersecurity issues with it as IoT devices are highly heterogeneous and quite limited in resources. The Internet of things (IoT) is without a doubt one of the most commercially viable technologies in history, with billions of IoT devices in use every day. However, the interconnected nature of these devices also means that they are highly vulnerable to cyber-attacks, and tec
APA, Harvard, Vancouver, ISO, and other styles
31

S, Dr Swapna. "Advanced Threat Detection with Active Directory and SIEM." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2799–805. https://doi.org/10.22214/ijraset.2025.68478.

Full text
Abstract:
As cyber threats become more sophisticated, traditional security mechanisms relying solely on Active Directory (AD) for authentication and authorization lack real-time threat detection and response capabilities. This project enhances security by integrating AD with Splunk, a Security Information and Event Management (SIEM) solution, within a virtualized environment where Microsoft Server 2022 hosts AD services and a Domain Controller, while Splunk provides centralized security monitoring. PowerShell scripting automates user management and event log monitoring, improving administrative efficien
APA, Harvard, Vancouver, ISO, and other styles
32

Adetunji Paul Adejumo and Chinonso Peter Ogburie. "The role of cybersecurity in safeguarding finance in a digital era." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 1542–56. https://doi.org/10.30574/wjarr.2025.25.3.0909.

Full text
Abstract:
In an increasingly digital world, cybersecurity plays a crucial role in protecting financial institutions, businesses, and consumers from cyber threats. The financial sector, being a prime target for cybercriminals, faces a growing number of risks, including data breaches, phishing attacks, ransomware, and financial fraud. As digital transactions, online banking, and fintech innovations become more prevalent, the need for robust cybersecurity measures has never been more critical. This paper explores the significance of cybersecurity in safeguarding financial systems, highlighting key challeng
APA, Harvard, Vancouver, ISO, and other styles
33

Jaiswal, Ishu Anand, and Dr Rajneesh Kumar Singh. "Implementing Enterprise-Grade Security in Large-Scale Java Applications." International Journal of Research in Modern Engineering & Emerging Technology 13, no. 3 (2025): 424–33. https://doi.org/10.63345/ijrmeet.org.v13.i3.28.

Full text
Abstract:
In the modern digital landscape, security has become an integral component of enterprise software development. This paper explores the implementation of enterprise-grade security measures within large-scale Java applications, focusing on robust methodologies designed to mitigate emerging threats and safeguard critical data. The research investigates various strategies that incorporate advanced authentication mechanisms, role-based access control, encryption protocols, and secure coding practices, ensuring that security is seamlessly integrated throughout the development lifecycle. Through an e
APA, Harvard, Vancouver, ISO, and other styles
34

MAHIPAL REDDY YALLA. "Zero-trust security architecture in the ai era: a novel framework for enterprise cyber resilience." International Journal of Science and Research Archive 13, no. 2 (2024): 4341–56. https://doi.org/10.30574/ijsra.2024.13.2.0172.

Full text
Abstract:
The dependency of enterprises on artificial intelligence (AI) for operational efficiency creates new and emerging problems for cybersecurity because of threats generated by AI systems. ZTSA has replaced perimeter-based security models as a necessary means to defend against modern innovative attacks. This analysis traces the development of Zero-Trust Security systems backed by artificial intelligence for defending against contemporary malware threats and discusses their implementation practices. The analysis presents Zero-Trust's core concepts including "never trust, always verify" with micro-s
APA, Harvard, Vancouver, ISO, and other styles
35

Janaki Sivakumar. "Ai-Driven Cyber Threat Detection: Enhancing Security Through Intelligent Engineering Systems." Journal of Information Systems Engineering and Management 10, no. 19s (2025): 790–98. https://doi.org/10.52783/jisem.v10i19s.3116.

Full text
Abstract:
The rapid proliferation of digital technologies has significantly expanded the attack surface for cyber threats, making traditional security measures increasingly inadequate. Artificial Intelligence (AI)-driven cyber threat detection is emerging as a transformative approach to safeguarding digital ecosystems through intelligent engineering systems. This paper explores the integration of AI and machine learning (ML) techniques in cyber threat detection, focusing on how these advanced technologies enhance security, automate threat intelligence, and mitigate evolving cyber risks in real-time. AI-
APA, Harvard, Vancouver, ISO, and other styles
36

Hewa Majeed Zangana, Harman Salih Mohammed, and Mamo Muhamad Husain. "Banking Cybersecurity: Safeguarding Financial Information in the Digital Era." Journal of Computers and Digital Business 4, no. 2 (2025): 56–63. https://doi.org/10.56427/jcbd.v4i2.751.

Full text
Abstract:
This study explores the escalating cybersecurity challenges in the banking sector and the potential of large language models (LLMs) to enhance digital defense mechanisms. Employing a qualitative methodology that includes a systematic literature review, expert interviews, and case study evaluations, the research investigates the integration of LLMs in cybersecurity operations such as threat detection, automated incident response, and user authentication. The findings reveal that LLMs offer significant advantages in real-time anomaly detection, predictive analytics, and natural language-based se
APA, Harvard, Vancouver, ISO, and other styles
37

Bhaskar, T., M. N. Narsaiah, and M. Ravikanth. "Central Medical Centre Healthcare Data Security with Lightweight Blockchain Model in IoT Sensor Environment." Journal of Sensors, IoT & Health Sciences 1, no. 1 (2023): 15–26. http://dx.doi.org/10.69996/jsihs.2023002.

Full text
Abstract:
Data security involves implementing measures to protect digital information from unauthorized access, disclosure, alteration, or destruction, ensuring the confidentiality, integrity, and availability of sensitive data. Hence, this paper addresses the critical imperative of ensuring robust data security within the healthcare domain. With the proliferation of digital technologies and interconnected systems, safeguarding patient information has become paramount. The study comprehensively reviews existing strategies for data security in healthcare, including encryption, access controls, and secure
APA, Harvard, Vancouver, ISO, and other styles
38

Tolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.

Full text
Abstract:
Systems for detecting network intrusions and detecting signs of attacks on information systems have long been used as one of the necessary lines of defense of information systems. Today, intrusion and attack detection systems are usually software or hardware-software solutions that automate the process of monitoring events occurring in an information system or network, as well as independently analyze these events in search of signs of security problems. As the number of different types and ways of organizing unauthorized intrusions into foreign networks has increased significantly in recent y
APA, Harvard, Vancouver, ISO, and other styles
39

Srikanth Reddy Vutukuru, Et al. "SecureIoT: Novel Machine Learning Algorithms for Detecting and Preventing Attacks on IoT Devices." Journal of Electrical Systems 19, no. 4 (2024): 315–35. http://dx.doi.org/10.52783/jes.641.

Full text
Abstract:
This research paper deals with the enhancement of Internet of Things (IoT) security through federated ensemble learning (FEI) and adversarial machine learning (AMLI) algorithms. The proposed approach strives to enhance the security of IoT devices and networks against numerous cyber threats. To address the increasing threat of IoT, the study will utilize advanced machine learning techniques in order to build more resilient defenses for IoT networks. Using the IoT-23_Combined dataset, the study scrutinized an array of IoT attack types, revealing the distribution and frequency of different attack
APA, Harvard, Vancouver, ISO, and other styles
40

Adetunji Paul Adejumo and Chinonso Peter Ogburie. "Strengthening finance with cybersecurity: Ensuring safer digital transactions." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 1527–41. https://doi.org/10.30574/wjarr.2025.25.3.0908.

Full text
Abstract:
The rapid digitalization of financial services has revolutionized global transactions, offering convenience, speed, and efficiency. However, this transformation has also introduced significant cybersecurity risks, including fraud, data breaches, and cyberattacks. As financial institutions and consumers increasingly rely on digital platforms, ensuring the security of financial transactions has become paramount. This paper explores the critical role of cybersecurity in strengthening the financial sector, emphasizing strategies to mitigate risks and enhance trust in digital transactions. It exami
APA, Harvard, Vancouver, ISO, and other styles
41

Ali, Guma, Aziku Samuel, Simon Peter Kabiito, et al. "Integration of Artificial Intelligence, Blockchain, and Quantum Cryptography for Securing the Industrial Internet of Things (IIoT): Recent Advancements and Future Trends." Applied Data Science and Analysis 2025 (March 27, 2025): 19–82. https://doi.org/10.58496/adsa/2025/004.

Full text
Abstract:
The swift growth of the Industrial Internet of Things (IIoT) offers tremendous potential to boost productivity, facilitate real-time decision-making, and automate procedures in various industries. However, as industries increasingly adopt IIoT, they face paramount data security, privacy, and system integrity challenges. Artificial intelligence (AI), Blockchain, and quantum cryptography are gaining significant attention as solutions to address these challenges. This paper comprehensively surveys advanced technologies and their potential applications for securing IIoT ecosystems. It reviews find
APA, Harvard, Vancouver, ISO, and other styles
42

Johnson Sunday Oliha, Preye Winston Biu, and Ogagua Chimezie Obi. "SECURING THE SMART CITY: A REVIEW OF CYBERSECURITY CHALLENGES AND STRATEGIES." Engineering Science & Technology Journal 5, no. 2 (2024): 496–506. http://dx.doi.org/10.51594/estj.v5i2.827.

Full text
Abstract:
In the era of rapid urbanization and technological advancement, the emergence of smart cities promises innovative solutions to urban challenges. However, the integration of various technologies into urban infrastructures also exposes cities to unprecedented cybersecurity threats. This review presents a comprehensive review of the cybersecurity challenges faced by smart cities and explores the strategies to mitigate these risks. Smart cities leverage interconnected networks of sensors, devices, and systems to enhance efficiency, sustainability, and citizen services. Yet, this interconnectedness
APA, Harvard, Vancouver, ISO, and other styles
43

Johnson Sunday Oliha, Preye Winston Biu, and Ogagua Chimezie Obi. "Securing the smart city: A review of cybersecurity challenges and strategies." Open Access Research Journal of Multidisciplinary Studies 7, no. 1 (2024): 094–101. http://dx.doi.org/10.53022/oarjms.2024.7.1.0013.

Full text
Abstract:
In the era of rapid urbanization and technological advancement, the emergence of smart cities promises innovative solutions to urban challenges. However, the integration of various technologies into urban infrastructures also exposes cities to unprecedented cybersecurity threats. This review presents a comprehensive review of the cybersecurity challenges faced by smart cities and explores the strategies to mitigate these risks. Smart cities leverage interconnected networks of sensors, devices, and systems to enhance efficiency, sustainability, and citizen services. Yet, this interconnectedness
APA, Harvard, Vancouver, ISO, and other styles
44

Adelusi, Bamidele Samuel, Favour Uche Ojika, and Abel Chukwuemeke Uzoka. "Advances in Cybersecurity Strategy and Cloud Infrastructure Protection for SMEs in Emerging Markets." Journal of Frontiers in Multidisciplinary Research 3, no. 1 (2022): 467–82. https://doi.org/10.54660/.jfmr.2022.3.1.467-482.

Full text
Abstract:
The increasing reliance on digital platforms by small and medium-sized enterprises (SMEs) in emerging markets has significantly elevated cybersecurity risks, necessitating the development of advanced and adaptable protection strategies. This paper explores recent advances in cybersecurity strategy and cloud infrastructure protection specifically tailored for SMEs operating in resource-constrained and rapidly evolving environments. SMEs in emerging markets face unique challenges, including limited access to sophisticated security technologies, skills shortages, and growing vulnerability to cybe
APA, Harvard, Vancouver, ISO, and other styles
45

Sudhanshu, Sekhar Tripathy, and Behera Bichitrananda. "EVALUATION OF FUTURE PERSPECTIVES ON SNORT AND WIRESHARK AS TOOLS AND TECHNIQUES FOR INTRUSION DETECTION SYSTEM." Industrial Engineering Journal 53, no. 10 (2024): 18–40. https://doi.org/10.5281/zenodo.14213834.

Full text
Abstract:
The increasing reliance on inter-organizational information exchange has raised significant concerns about the security of data and network infrastructures. Network monitoring plays a crucial role in mitigating these concerns, with tools like Wireshark and Snort forming the backbone of Intrusion Detection Systems (IDS). Initially developed as a packet inspection application, Wireshark is widely regarded for its user-friendly interface and intuitive packet-enhancement features, making it effective for classifying various types of network traffic. This research explores the practical application
APA, Harvard, Vancouver, ISO, and other styles
46

Rea Mie A. Omas-as and Jerry I. Teleron. "Enhancing Network Security: A Robust Network Access Control and Authentication Mechanism for Secure Data Transmission." International Journal of Advanced Research in Science, Communication and Technology, December 5, 2023, 182–87. http://dx.doi.org/10.48175/ijarsct-14023.

Full text
Abstract:
In an era dominated by digital communication and networked systems, the imperative to secure data transmission is more critical than ever. This paper introduces a cutting-edge Network Access Control (NAC) and authentication mechanism aimed at fortifying the security of data transmission across networks. Leveraging advanced technologies such as biometric authentication, multi-factor authentication (MFA), and anomaly detection, the proposed mechanism establishes a robust line of defense against unauthorized access and evolving cyber threats. Drawing on a comprehensive review of literature, real-
APA, Harvard, Vancouver, ISO, and other styles
47

Prof. Aravinda Thejas Chandra, Bommineni Lakshmi Ramya, Dhanunjaya Reddy Sai Lavanya, Bhoomika R, and Chethana S. "A Secure and Optimal Content Validation and Protection Scheme for Information Centric Networks." International Journal of Advanced Research in Science, Communication and Technology, May 3, 2023, 58–66. http://dx.doi.org/10.48175/ijarsct-9717.

Full text
Abstract:
Information-Centric Networking (ICN) is a new Internet infrastructure architecture that is primarily created to accommodate the user demand for content delivery using in-network caching. ICN is vulnerable in that attackers can introduce poisoned content into the network and isolate users from reliable content sources, even if it helps users access content and makes better use of network resources. This attack can be effectively stopped by implementing signature verification in each router, however doing so comes at a significant computational cost. From a single route standpoint, existing ICN
APA, Harvard, Vancouver, ISO, and other styles
48

Jawad Khadim Alsayyad, Mohammed. "Researching Issues in Information Security in Internet of Things (IoT) Systems: Challenge & Solution." Journal of Al-Qadisiyah for Computer Science and Mathematics 16, no. 4 (2024). https://doi.org/10.29304/jqcsm.2024.16.41786.

Full text
Abstract:
As Internet of Things (IoT) technologies and applications are widely used and spread across various fields such as industry, agriculture, transportation, health, etc., it has become necessary to continuously research and develop information security as technologies and applications evolve. Organizations need to focus their efforts on system security. Any security vulnerability can lead to system failure or cyber-attacks, which can have a wide-ranging impact. IoT security is a protection strategy and defense mechanism that safeguards against the possibility of cyber-attacks that specifically ta
APA, Harvard, Vancouver, ISO, and other styles
49

Nagpure, Vaishali. "Case Study: The Next Generation of Network Management - AI, Automation, and Security in a Connected World." International Journal of Automation, Artificial Intelligence and Machine Learning, December 26, 2024, 133–49. https://doi.org/10.61797/ijaaiml.v4i2.379.

Full text
Abstract:
Modern data center networks face unprecedented challenges in ensuring robust security due to the evolving complexity of cyber threats and the increasing sophistication of attack vectors. This study proposes comprehensive, multi-layered security architecture tailored for data center environments, integrating advanced technologies such as Next-Generation Firewalls (NGFWs), Zero Trust Architecture (ZTA), AI-driven anomaly detection, SQL-based policy management, and Neo4j knowledge graphs. The architecture leverages NGFWs for deep packet inspection and application-layer filtering, fortifying the n
APA, Harvard, Vancouver, ISO, and other styles
50

Dul, Magdalena, Łukasz GUGAŁA, and Kamil ŁABA. "Protecting web applications from authentication attacks." Advances in Web Development Journal 1, no. 1 (2023). https://doi.org/10.5281/zenodo.10049992.

Full text
Abstract:
<i>This paper explores the critical domain of safeguarding web-based applications against authentication attacks, recognizing the persistent challenges posed by evolving cyber threats. The project delineates the distinct objectives of such attacks, including data theft, identity theft, and service disruption, underlining their potential far-reaching implications, such as the compromise of sensitive corporate data and the execution of unauthorized administrative operations. It underscores the pivotal role of user awareness and education as the ultimate defense against authentication-related bre
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!