Academic literature on the topic 'Keywords: Cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Keywords: Cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Keywords: Cybersecurity"

1

Yılmaz, Vedat. "A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security." Balkan Journal of Electrical and Computer Engineering 13, no. 2 (2025): 210–18. https://doi.org/10.17694/bajece.1608364.

Full text
Abstract:
This bibliometric study conducts a comprehensive analysis of the field of cybersecurity, particularly in the context of law enforcement and security strategies, to examine key trends, author influence, and interdisciplinary connections within the literature. In the WoS database, 6606 articles were reached by using the search expression in the title, abstract and keywords fields ("Cyber security" or "cyber-attacks" or "cyber protection" or "spam cyber security" or "data security" or "network security" or "anomaly detection" or "cyber countermeasures") and restricting the year of publication to
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. "Graph-Theoretical Intelligence for Adaptive Cybersecurity: Multi-Modal Models, Dynamic Defense, and Federated Threat Detection." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 347–56. https://doi.org/10.62311/nesx/rp3125.

Full text
Abstract:
Abstract: The rise of sophisticated cyber threats demands adaptive, resilient, and intelligent cybersecurity mechanisms. Graph theory has emerged as a foundational tool for modeling, detecting, and responding to complex attack patterns. This paper critically interprets recent advancements across cybersecurity knowledge graphs, graph neural networks, attack graphs, and federated graph learning. A multi-modal, graph-theoretical intelligence framework is proposed to enhance dynamic defense and collaborative threat detection while maintaining privacy. Statistical analysis, visual models, and new s
APA, Harvard, Vancouver, ISO, and other styles
3

pavan G, Dr Swapna. "Social Media Cybersecurity: A Behavioural and Technological Perspective." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48730.

Full text
Abstract:
Abstract Social media platforms' rapid expansion has made cybersecurity a major issue that affects billions of users globally. This study examines cybersecurity's function, effects, and safeguards in relation to social media. Users of social media are more vulnerable to a variety of online dangers, such as dangerous software, phishing scams, cyberbullying, identity theft, and phony profiles. These risks impact users' emotional health and organizational security in addition to compromising personal data. Although the majority of platforms have built-in security protections, the study emphasizes
APA, Harvard, Vancouver, ISO, and other styles
4

LAGE SERRANO, OSCAR, and MARIA SAIZ SANTOS. "BLOCKCHAIN AND THE DECENTRALISATION OF THE CYBERSECURITY INDUSTRY." DYNA 96, no. 3 (2021): 239. http://dx.doi.org/10.6036/10188.

Full text
Abstract:
This paper aims to analyse the potential impact that blockchain technology will have on the cybersecurity industry. We will look at different applications of blockchain technology in the field of cybersecurity, as well as a new trend of decentralisation of cybersecurity services. Blockchain is precisely a cybersecurity architecture that enables the decentralisation of processes and business models, which could have a direct consequence on cybersecurity services, as well as on the industry itself. Cybersecurity companies will have to adapt to a new ecosystem in which the blockchain technology w
APA, Harvard, Vancouver, ISO, and other styles
5

Efimova, Anna, and Artem Ivashchenko. "STUDY OF THE IMPACT OF DIGITAL TRANSFORMATION ON THE ECONOMIC ASPECTS OF CYBERSECURITY IN THE BUSINESS ENVIRONMENT." Actual Problems of Economics 1, no. 274 (2024): 163–74. http://dx.doi.org/10.32752/1993-6788-2024-1-274-163-174.

Full text
Abstract:
The impact of digital transformation on the economic aspects of cybersecurity in the business environment has been investigated. The main challenges and opportunities arising from the implementation of new technologies have been considered. The economic consequences of cyber threats have been analyzed, and strategies for improving business' cybersecurity have been proposed. Keywords: digital transformation, cybersecurity, business environment, cyber threats, cybersecurity strategies.
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Mohammed Mustafa. "CYBERSECURITY AWARENESS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem36233.

Full text
Abstract:
Technology is advancing at a very high speed, becoming more sophisticated and complex. Similarly, due to the vastness of the digital world, cyber threats have also increased in complexity and frequency. The rapid advancement of technology has brought unprecedented conveniences but also significant risks. Therefore, security awareness is essential for every individual and organization. Cyber threats such as phishing attacks, malware attacks, social engineering, Denial of service attacks, and insider threats have become sophisticated, proving to be a challenge to individuals and organizations. T
APA, Harvard, Vancouver, ISO, and other styles
7

P, Dr Rachana. "Strategic Approaches to Cybersecurity Audits for Control Evaluation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem40065.

Full text
Abstract:
This article presents an empirical study evaluating the effectiveness of the CyberSecurity Audit Model (CSAM 2.0) at a Canadian higher education institution. CSAM 2.0 is a comprehensive model used to assess cybersecurity assurance, maturity, and readiness in medium to large organizations and at the national level. It allows for the effective evaluation of security controls across various cybersecurity domains. The study highlights global best practices in cybersecurity audits, highlighting the lack of standardized guidelines and weaknesses in cybersecurity training programs. The paper details
APA, Harvard, Vancouver, ISO, and other styles
8

Jumanah, Hasan AlSanad. "Cybersecurity In Education." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 51–61. https://doi.org/10.5281/zenodo.12566761.

Full text
Abstract:
<strong>Abstract</strong><strong>:</strong> In this research, we presented an explanation of the definition of cybersecurity, its importance, and its types. We also explained the difference between information security and cybersecurity, as well as the importance of both. we also mentioned how cyber security is important in the education sector and the Role of training and education in enhancing Cybersecurity. <strong>Keywords:</strong> cybersecurity, information security, education sector. <strong>Title:</strong> Cybersecurity In Education <strong>Author:</strong> Jumanah Hasan AlSanad <stron
APA, Harvard, Vancouver, ISO, and other styles
9

Daliya1, Mohit Singh. "The Role of Cybersecurity in Blockchain." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30686.

Full text
Abstract:
As the maintenance of blockchain grows, so does the importance of cybersecurity in ensuring its integrity and purity. This paper explores the critical role of cybersecurity in the context of blockchain technology. The paper begins by providing an overview of blockchain technology and its key features, highlighting its potential benefits and challenges. It then delves into the cybersecurity considerations specific to blockchain, including cryptographic principles, consensus mechanisms, and smart contract vulnerabilities. The paper also evaluates current cybersecurity practices and solutions tai
APA, Harvard, Vancouver, ISO, and other styles
10

Folorunsho, O. S., A. Q. Ayinde, M. A. Olagoke, and O. E. Fatoye. "Implementation of Cybersecurity Risk Theory and Model in Healthcare." Advances in Multidisciplinary and scientific Research Journal Publication 13, no. 4 (2022): 65–72. http://dx.doi.org/10.22624/aims/cisdi/v13n4p4.

Full text
Abstract:
This review paper examines the implementation of cybersecurity risk theory and models in Healthcare, including their benefits and challenges. The paper begins with an overview of cybersecurity risk theory and models, including the STAMP theory and various types of models. It then compares different cybersecurity risk models and discusses their strengths and weaknesses. The paper also explores case studies of the successful implementation of cybersecurity risk models in Healthcare and the challenges these organizations face. The importance of risk assessment and management in healthcare cyberse
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Keywords: Cybersecurity"

1

Elsa Philip, Chanjana, and Tharzana P. A. THE INTER-RELATIONSHIP BETWEEN E-COMMERCE AND RIGHT TO PRIVACY: AN ASSESSMENT. Magestic Technology Solutions (P) Ltd, Chennai, Tamil Nadu, India, 2023. http://dx.doi.org/10.47716/mts.b.978-93-92090-31-8.

Full text
Abstract:
The Inter-Relationship Between E-Commerce and Right to Privacy: An Assessment” explores the intricate dynamics between the burgeoning world of e-commerce and the fundamental right to privacy. This book offers a comprehensive analysis of how these two spheres interact and influence each other, especially in the context of the digital age where online transactions and data exchanges are ubiquitous. Beginning with an introduction to the core concepts, the book systematically examines the nature and scope of information technology and e-commerce. It delves into the various types of e-commerce, the
APA, Harvard, Vancouver, ISO, and other styles
2

Palkova, Karina, Aleksandra Palkova, Vitālijs Rakstins, et al. Handbook for Academic and Scientific Institutions: Improve Risk Management and Institutional Resilience in the face of Security Threats. Rīga Stradiņš University, 2024. https://doi.org/10.25143/handbook_isbn-978-9934-618-61-1.

Full text
Abstract:
Science and academia have long been shaped by international competition, providing nations with strategic advantages in economic, technological, and military domains. Today, as globalization intensifies, academic and research institutions face complex security challenges, including cyber threats, foreign interference, and hybrid warfare. These risks jeopardize intellectual property, research integrity, and institutional autonomy. To address these threats, institutions must implement robust internal risk management systems, minimize vulnerabilities in supply chains, and reduce dependency on for
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Keywords: Cybersecurity"

1

Yin, Hui, Yu Zhang, Fangmin Li, and Keqin Li. "Attribute-Based Secure Keyword Search for Cloud Computing." In Cybersecurity and High-Performance Computing Environments. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003155799-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kashihara, Kazuaki, Harshdeep Singh Sandhu, and Jana Shakarian. "Automated Corpus Annotation for Cybersecurity Named Entity Recognition with Small Keyword Dictionary." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-82199-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pasupuleti, Murali Krishna. "Quantum Communication and Cybersecurity: Advancements in Cryptography and Secure Satellite Networks." In Quantum Communication and Cybersecurity. National Education Services, 2025. https://doi.org/10.62311/nesx/77548.

Full text
Abstract:
Abstract: This chapter explores the transformative impact of quantum communication technologies in addressing modern cybersecurity challenges. It delves into the advancements in quantum cryptography, including quantum key distribution (QKD) protocols such as BB84 and E91, and their ability to provide theoretically unbreakable security by leveraging quantum principles like superposition and entanglement. The chapter highlights the significance of secure satellite networks, with a focus on groundbreaking projects such as China’s Micius satellite and the European Quantum Communication Infrastruct
APA, Harvard, Vancouver, ISO, and other styles
4

Krishna Pasupuleti, Murali. "AI-Driven Cybersecurity: Safeguarding Enterprise Infrastructure and Digital Assets." In AI in Cybersecurity for Enterprises: Tools for Protecting Digital Assets and Infrastructure. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/905735.

Full text
Abstract:
Abstract: This chapter delves into the transformative role of AI in enhancing cybersecurity, particularly in safeguarding enterprise infrastructure and digital assets. It explores how AI-driven tools and technologies are redefining cybersecurity by offering more effective, efficient, and adaptive defense strategies. The chapter covers key AI technologies such as machine learning, neural networks, and natural language processing, highlighting their applications in threat detection, threat intelligence, automated incident response, and Security Operations Center (SOC) enhancement. Additionally,
APA, Harvard, Vancouver, ISO, and other styles
5

Das, Ms Rishita, and Mr Rhythm Mukherjee. "INFORMATION TECHNOLOGY." In Futuristic Trends in Management Volume 3 Book 7. Iterative International Publisher, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bhma7p1ch5.

Full text
Abstract:
Information Technology explores several futuristic trends in management, including Artificial Intelligence (AI), Cybersecurity and Risk Management, Supply Chain Management, and the Internet of Things (IoT). The chapter examines the applications, benefits, and challenges associated with these trends, providing valuable insights for organizations navigating the dynamic business landscape. The chapter begins by exploring the role of Artificial Intelligence in decision-making processes. It highlights AI's ability to analyse large volumes of data, identify patterns, and improve decision accuracy. T
APA, Harvard, Vancouver, ISO, and other styles
6

Pasupuleti, Murali Krishna. "Legal and Regulatory Frameworks for AI in Cybersecurity: Strategies Against Threats and Fraud." In AI-Enabled Security: Defending the Digital Realm Against Cyber Threats and Fraud. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/97890.

Full text
Abstract:
Abstract: This chapter delves into the intricate web of legal and regulatory frameworks governing the deployment of Artificial Intelligence (AI) in cybersecurity. In an era where digital threats evolve with alarming speed and complexity, AI offers a beacon of hope for robust defense mechanisms. However, the integration of AI into cybersecurity strategies introduces a plethora of legal and ethical considerations that must be navigated with precision. From data protection and privacy concerns under regulations like GDPR and CCPA to the challenges of ensuring fairness, accountability, and transpa
APA, Harvard, Vancouver, ISO, and other styles
7

Pasupuleti, Murali Krishna. "Quantum Computing and the Future of Digital Security." In Quantum Computing: The Next Information Age. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/97818.

Full text
Abstract:
Abstract: This chapter critically examines the profound impact of quantum computing on the landscape of digital security, signaling a paradigm shift in how encryption and cybersecurity are approached in the quantum era. Quantum computing, characterized by its ability to solve complex problems at unprecedented speeds, poses both challenges and opportunities for current encryption methods. It threatens to render traditional cryptographic schemes obsolete while simultaneously offering groundbreaking approaches to secure digital communications through quantum-resistant cryptography and quantum key
APA, Harvard, Vancouver, ISO, and other styles
8

Krishna Pasupuleti, Murali. "IoT-Driven Transformation: Advancing Agriculture, Smart Cities, and Digital Security." In Smart IoT Solutions: Revolutionizing Agriculture, Urban Infrastructure, and Cybersecurity. National Education Services, 2024. https://doi.org/10.62311/nesx/46059.

Full text
Abstract:
Abstract: The chapter "IoT-Driven Transformation: Advancing Agriculture, Smart Cities, and Digital Security" explores the revolutionary role of Internet of Things (IoT) technologies in addressing global challenges across critical sectors. It delves into how IoT-driven solutions are redefining precision agriculture through real-time monitoring, smart farming tools, and sustainable practices. The chapter highlights IoT’s transformative impact on urban infrastructure by enabling smart city technologies, enhancing mobility, energy efficiency, and public safety. It also examines the integration of
APA, Harvard, Vancouver, ISO, and other styles
9

Krishna Pasupuleti, Murali. "Techno-Diplomacy and Global Power Shifts: The Strategic Role of Alliances in a Digital Age." In Global Superpower Dynamics: The Role of Technology and Diplomacy in Shaping Future Alliances. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/66272.

Full text
Abstract:
Abstract: This chapter examines the evolving landscape of global power dynamics through the lens of techno-diplomacy, exploring how technological advancements and digital diplomacy shape international alliances. It delves into the strategic use of emerging technologies—such as artificial intelligence, cybersecurity, quantum computing, and digital infrastructure—by superpowers to gain influence and establish partnerships. Through case studies on alliances like the QUAD, China’s Digital Silk Road, and the EU’s digital sovereignty initiatives, the chapter highlights how technology-driven alliance
APA, Harvard, Vancouver, ISO, and other styles
10

Pasupuleti, Murali Krishna. "AI and IoT for the Smart Economy: Transforming Manufacturing and Service Industries." In AI and IoT in the Smart Economy: Revolutionizing Manufacturing and Services. National Education Services, 2025. https://doi.org/10.62311/nesx/68106.

Full text
Abstract:
Abstract: The convergence of Artificial Intelligence (AI) and the Internet of Things (IoT) is revolutionizing manufacturing and service industries, driving automation, efficiency, and intelligent decision-making in the smart economy. This chapter explores the integration of AI-powered analytics, IoT-connected devices, and real-time data processing to optimize industrial automation, predictive maintenance, supply chain logistics, and personalized customer experiences. Key topics include smart manufacturing with AI-driven IoT frameworks, digital twins for predictive asset management, AI-optimize
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Keywords: Cybersecurity"

1

Komosar, Aleksa, Dragana Slavic, Slavko Rakić, and Darko Stefanović. "MAPPING THE INTERSECTION OF CYBERSECURITY AND INDUSTRY 5.0: A BIBLIOMETRIC ANALYSIS." In INTERNATIONAL Conference on Business, Management, and Economics Engineering Future-BME. Faculty of Technical Sciences, Novi Sad, 2025. https://doi.org/10.24867/future-bme-2024-078.

Full text
Abstract:
Industry 5.0 is a human-centric strategy that emphasizes the collaboration between humans and advanced technologies. On the other hand, cybersecurity is fundamentally oriented towards protecting people and their interactions with these technologies, especially within the framework of Industry 5.0. The increasing digitization and reliance on technology emerge in the development and implementation of cybersecurity concepts, measures, and implementations. This paper includes the intersection of Industry 5.0 and cybersecurity, focusing on their integration and the resulting research. It identifies
APA, Harvard, Vancouver, ISO, and other styles
2

Talabi, A. A., O. B. Longe, A. A. Muhammad, and K. Olusanya. "Cybersecurity Risk Management in Identity Systems using Biometric-based Multimodal Authentication." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28n2p5.

Full text
Abstract:
This increasing inter-connectivity of systems and dependence on computer and internet-based networks has made Cybersecurity related risks management issues major considerations in designing, developing and managing identity systems. Thus, this paper investigates Cybersecurity and related risk management challenges in Identity Management Systems by undertaking a comparative analysis of different biometric traits. The analysis proved that biometric-based multimodal systems are more secure than uni-modal systems with high accuracy rates. Also, it produced minimal false acceptance and false reject
APA, Harvard, Vancouver, ISO, and other styles
3

Bhuvaneshwari, A. J., and P. Kaythry. "Enhanced Lightweight Visual Cryptosystem (ELVC): Fortifying Cybersecurity for Visual Data Protection." In 3rd SLIIT International Conference on Engineering and Technology. SLIIT, 2024. http://dx.doi.org/10.54389/tddb1160.

Full text
Abstract:
Within the field of cybersecurity, protecting visual data poses significant difficulties because of its extensive use and vulnerability to unwanted access. This article introduces the Enhanced Lightweight Visual Cryptosystem (ELVC), which is intended to strengthen cybersecurity by efficiently encrypting visual data. Using the Blake2 hash algorithm and advanced encryption techniques, the ELVC encrypts AC and DC coefficients, which are critical components in visual data compression. The encryption algorithm improves data security by calculating entropy, histograms, and PSNR values. Rigorous NIST
APA, Harvard, Vancouver, ISO, and other styles
4

Mathews, Anurag, and S. M Taiabul Haque. "Exploring the Risks of Password Reuse across Websites of Different Importance." In 12th International Conference on Human Interaction and Emerging Technologies (IHIET 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005468.

Full text
Abstract:
This study attempts to simulate the different ways through which a malicious hacker may attempt to gain unauthorized access to user accounts by leveraging the similarities between multiple linked passwords of the same user. The issue of managing multiple password-protected accounts exemplifies the usability/security trade-off in cybersecurity. Users often reuse the same password, with little or no modifications, across websites of different importance, compromising the security of the high-value accounts. By combining syntactic similarity, dictionary attack, service-related keywords, and seman
APA, Harvard, Vancouver, ISO, and other styles
5

Bahmanova, Alona, and Natalja Lace. "From cyber security to cyber resilience: safeguarding against evolving risks in the digital landscape." In 14th International Scientific Conference „Business and Management 2024“. Vilnius Gediminas Technical University, 2024. http://dx.doi.org/10.3846/bm.2024.1317.

Full text
Abstract:
This literature review examines the evolving discourse on digitalization’s risks, particularly in cyberspace, and advocates for a transition from cyber security to cyber resilience. Initially explored “digital risks”, it shifts focus to keywords like “cyber risks”, “cybersecurity”, and “cyber resilience” to reflect changing dynamics. Through article analysis, it provides insights into researchers’ perceptions, challenges, and strategies in addressing cyber risks. Each section offers concise summaries from published articles, fostering interdisciplinary understanding. Emphasising the imperative
APA, Harvard, Vancouver, ISO, and other styles
6

Teh, Yit Loong, Yit Loong Tan, and Siaw Lang Wong. "5G Cybersecurity: Risk Assessment and Incident Response in the Healthcare Industry." In International Conference on Digital Transformation and Applications (ICDXA 2021). Tunku Abdul Rahman University College, 2021. http://dx.doi.org/10.56453/icdxa.2021.1015.

Full text
Abstract:
Rapid proliferation and developments in the field of telecommunication have led to a renewed interest in the fifth-generation technology standard for broadband cellular networks. As compared to the previous generations, 5G is capable of connecting numerous nodes simultaneously while offering pathbreaking implementations in enabling time-critical services such as autonomous vehicles, real-time drone manoeuvres, Industry 4.0, virtual reality, augmented reality, etc. Nevertheless, these conveniences may turn out to be security threats or vulnerabilities susceptible to cyberattacks. Apparently, th
APA, Harvard, Vancouver, ISO, and other styles
7

Diallo, Ousmane, Hasnani Hassan, and Muslim Najeeb Zaidan. "Leveraging Naive Bayesian Machine Learning for Detecting Pig Butchering Scams: A Cybersecurity Social Engineering Perspective in Africa." In The 5th International Scientific Conference on Administrative and Financial Sciences (CIC-ISCAFS'2025). Cihan University-Erbil, 2025. https://doi.org/10.24086/icafs2025/paper.1746.

Full text
Abstract:
Abstract- investment scams, particularly pig butchering scams, are a burgeoning global issue, particularly in Africa, resulting in substantial emotional and financial damage. Fraudsters frequently employ psychological manipulation and trust-based strategies, frequently through the use of social media, to entice individuals into fraudulent investment schemes. Criminals have increased their opportunities to exploit unsuspecting individuals in Africa as a result of the increasing prevalence of the internet. For example, Nigeria incurs an estimated $500 million in annual losses due to internet dec
APA, Harvard, Vancouver, ISO, and other styles
8

Gündoğar, Ali, and Saulius Niauronis. "Overview of Potential Risks of Artificial General Intelligence Robots." In Applied Scientific Research. Šiaulių valstybinė kolegija / Šiauliai State Higher Education Institution, 2023. http://dx.doi.org/10.56131/tmt.2023.2.1.93.

Full text
Abstract:
The potential risks posed by robots with advanced artificial intelligence (also known as Artificial General Intelligence - AGI), against humanity are categorized and discussed. The threats of this type of artificial intelligence in robots can be observed from several different approaches such as social, security and safety problems. Potential threats are rising not only from AGI, but also from human behavior in presence of AGI. Advanced applications such as chatbots, android robots, lethal weapons, etc. were assessed by means of different observed flaws (such as intention to harm humans, human
APA, Harvard, Vancouver, ISO, and other styles
9

Isaac Gabriel, Odun-Ayo. "A Review of Common Tools and Techniques for Reconnaissance Attacks.. Proceedings of the." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p11.

Full text
Abstract:
Background: A reconnaissance helps the attacker gain valuable information on the target to help the attacker select the best tools that would make the attack successful. Aim: This study aims to review tools for reconnaissance attacks which will be beneficial to professional ethical hackers and also enlighten organizations and the general public of the potential harm of successful reconnaissance attacks. Methodology: The databases – Springer, Elsevier, Wiley, IEEE, ACM, ArXiv, and Google Scholar were explored. A quantitative evaluation was conducted on 19 selected articles. Result: 95.2% of the
APA, Harvard, Vancouver, ISO, and other styles
10

Oluoha, U. O., G. E. kereke, N. C. Udanor, and F. S. Bakpo. "A Deception Based Intelligent Intrusion Detection System for Detecting Threats of Exploits in Cloud Based Environments." In Advances in Multidisciplinary and Scientific Research Journal Publication. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28p2.

Full text
Abstract:
Despite its numerous advantages, cloud computing faces major security threats with constantly evolving digital prints and attack-like patterns. Unfortunately, due to the share size and complexity of cloud computing, traditional approaches to Intrusion Detection Systems (IDS) have been shown to be rather defective in adapting to, identifying and mitigating threat in cloud based environment. While, anomaly-based IDS are plagued with misidentifying legitimate network activities or sometimes permitting sophisticated malicious traffic patterns, signature-based IDS on the other hand are less adaptiv
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Keywords: Cybersecurity"

1

Pasupuleti, Murali Krishna. AI and Quantum-Nano Frontiers: Innovations in Health, Sustainability, Energy, and Security. National Education Services, 2025. https://doi.org/10.62311/nesx/rr525.

Full text
Abstract:
Abstract: This research report explores transformative advancements at the intersection of Artificial Intelligence (AI), Quantum Computing, and Nanotechnology, focusing on breakthrough innovations in health, sustainability, energy, and global security. By integrating quantum algorithms, AI-driven analytics, and advanced nanomaterials, this report highlights revolutionary solutions in precision medicine, predictive diagnostics, sustainable energy storage, universal water purification, and cybersecurity. Real-world case studies and emerging technologies such as graphene-based nanomaterials, quan
APA, Harvard, Vancouver, ISO, and other styles
2

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
3

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Full text
Abstract:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal ent
APA, Harvard, Vancouver, ISO, and other styles
4

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
5

Pasupuleti, Murali Krishna. Smart Nanomaterials and AI-Integrated Grids for Sustainable Renewable Energy. National Education Services, 2025. https://doi.org/10.62311/nesx/rr1025.

Full text
Abstract:
Abstract: The transition to sustainable and intelligent renewable energy systems is being driven by advancements in smart nanomaterials and AI-integrated smart grids. Nanotechnology has enabled the development of high-performance energy materials, such as graphene, perovskites, quantum dots, and MXenes, which enhance the efficiency, durability, and scalability of renewable energy solutions. Simultaneously, AI-driven smart grids leverage machine learning, deep learning, and digital twins to optimize energy distribution, predictive maintenance, and real-time load balancing in renewable energy ne
APA, Harvard, Vancouver, ISO, and other styles
6

Pasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.

Full text
Abstract:
Abstract: Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), is evolving into a transformative technology with applications in healthcare, education, industrial training, smart cities, and entertainment. This research presents a unified framework integrating AI-driven XR technologies with computer vision, deep learning, cloud computing, and 5G connectivity to enhance immersion, interactivity, and scalability. AI-powered neural rendering, real-time physics simulation, spatial computing, and gesture recognition enable more realistic and adap
APA, Harvard, Vancouver, ISO, and other styles
7

Pasupuleti, Murali Krishna. Quantum-Enhanced Machine Learning: Harnessing Quantum Computing for Next-Generation AI Systems. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv125.

Full text
Abstract:
Abstract Quantum-enhanced machine learning (QML) represents a paradigm shift in artificial intelligence by integrating quantum computing principles to solve complex computational problems more efficiently than classical methods. By leveraging quantum superposition, entanglement, and parallelism, QML has the potential to accelerate deep learning training, optimize combinatorial problems, and enhance feature selection in high-dimensional spaces. This research explores foundational quantum computing concepts relevant to AI, including quantum circuits, variational quantum algorithms, and quantum k
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!