-
21
An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks
Published 2024-06-01“…Attackers use IoT devices to create botnets and launch attacks, such as DDoS, Spamming, Cryptocurrency mining, Phishing, etc. The service providers of large-scale IoT networks need to set up a data pipeline to collect the vast network traffic data from the IoT devices, store it, analyze it, and report the malicious IoT devices and types of attacks. …”
Get full text
Article -
22
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01“… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
Get full text
Article -
23
Pengukuran Kesadaran Keamanan Informasi Pegawai: Studi Kasus PT Meshindo Jayatama
Published 2024-08-01“…Hasil wawancara dengan Presiden Direktur dan Manager Teknologi Informasi (TI) PT Meshindo Jayatama menyatakan bahwa telah terjadi serangan seperti Phishing dan Malware sebanyak 26 kali ditahun 2023. …”
Get full text
Article -
24
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Published 2025-02-01“…The article also offers a comprehensive taxonomy of financial services, categorizing cyber threats into game-based (e.g., phishing, malware, APTs) and non-game-based (e.g., social engineering, compliance issues) threats. …”
Get full text
Article -
25
Cyber security laws and safety in e-commerce in India
Published 2023-06-01“…The Indian Penal Code addresses unauthorized access, hacking, identity theft, phishing, and computer virus dissemination. The Reserve Bank of India oversees online payment and financial security, mandating two-factor authentication, encryption, and secure payment channels. …”
Get full text
Article