IMAGES

  1. Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation

    cyber security research paper ieee

  2. (PDF) Call for Papers Special Session organized on ‘Computational

    cyber security research paper ieee

  3. Research Paper On Applications Of Cyber Security

    cyber security research paper ieee

  4. (PDF) A Systematic Literature Review on the Cyber Security

    cyber security research paper ieee

  5. Next generation cyber security solution for an eHealth organization

    cyber security research paper ieee

  6. CALL FOR PAPER

    cyber security research paper ieee

VIDEO

  1. Advanced Cyber Security Research Lab- Doon University Dehradun

  2. Automated Android Malware Detection Using Optimal Ensemble Learning Approach for Cyber security

  3. Cyber Security in Power Systems Using Meta Heuristic and Deep Learning Algorithms

  4. Cybersecurity in Power Grids

  5. Career in Cyber Security

  6. cyber security question paper December 2023 #diploma

COMMENTS

  1. A Study of Cyber Security Issues and Challenges

    Then a few common cyber-attacks and the ways to protect from them are specified. At last, a famous case study of Mirai's attack on a few high-profile victims and the impact is presented. Published in: 2021 IEEE Bombay Section Signature Conference (IBSSC) Article #: Date of Conference: 18-20 November 2021.

  2. Cyber security: Current threats, challenges, and ...

    Cyber Security is a blend of innovative headways, process cycles and practices. The goal of cyber security is to ensure protection of applications, networks, PCs, and critical information from attack. ... a few security goals have been found. This paper reviews research work done in cybersecurity including the types of cybersecurity. The paper ...

  3. An Overview of Implementation Strategies on Cyber Security

    Because of the ubiquitous use of technology and the internet in modern culture, internet safety has become increasingly important. This study paper provides a complete assessment of the present status of cyber security, emphasizing the necessity for good practices and legislation to avoid future cyber-attacks. A detailed examination of cyber security will be offered, concentrating on its ...

  4. A Survey of Artificial Intelligence in Cybersecurity

    In this paper, we review the impact of AI in cybersecurity and summarize existing research in terms of benefits of AI in cybersecurity. Published in: 2020 International Conference on Computational Science and Computational Intelligence (CSCI) Article #: Date of Conference: 16-18 December 2020. Date Added to IEEE Xplore: 23 June 2021.

  5. Read

    IEEE Transactions on Dependable and Secure Computing (TDSC) publishes archival research results focusing on foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. Read the ...

  6. Cyber security: State of the art, challenges and future directions

    Abstract. Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every individual and organization faces continually shifting cyber threats.

  7. Recent Advances in Network Security Management

    Following the success of the recent TNSM special issues on cybersecurity techniques for managing networked systems in 2020 and 2021, this special issue will focus on recent advances in network security management. We welcome submissions addressing the important challenges (see the non-exhaustive list of topics below) and presenting novel research or experimentation results.

  8. Artificial intelligence for cybersecurity: Literature review and future

    IEEE & ACM digital library: No: ... The article is a full research paper (i.e., not a presentation or supplement to a poster). ... Cyber supply chain security. Cyber supply chain security requires a secure integrated network between the incoming and outgoing chain's subsystems. Therefore, it is essential to understand and predict threats using ...

  9. IEEE Cybersecurity

    IEEE Cybersecurity - Home of the IEEE Cybersecurity Initiative. Recently Published. October 2, 2018 | IEEE Cybersecurity Award Winners. October 1, 2018 | Save the Date for SecDev 2019. January 31, 2018 | IEEE SecDev 2018 Call for Papers. December 13, 2017 | Robert Cunningham on Advancing the Art and Science of Cybersecurity.

  10. Cybersecurity in Big Data Era: From Securing Big Data to ...

    With this paper, readers can have a more thorough understanding of cybersecurity in the big data era, as well as research trends and open challenges in this active research area. Published in: IEEE Transactions on Services Computing ( Volume: 14 , Issue: 6 , 01 Nov.-Dec. 2021 )

  11. Selected Papers from the IEEE International Conference of Cyber ...

    The IEEE CSR brought together members from academic and industry communities to present their achievements in cyber security and resiliance in the context of cyber-physical systems. The conference is organized every year for the exchange of information on the progress of research and development in the field.

  12. Cyber Security

    Cybersecurity, often known as information security, maintains the integrity, confidentiality, and availability (ICA) of data. Cybersecurity is a constantly developing set of tools, risk management techniques, technologies, training, and best practices to protect networks, computers, applications, and data against assaults or illegal users.

  13. A Review of Quantum Cybersecurity: Threats, Risks and ...

    The promise of quantum computing is not speeding up conventional computing rather delivering an exponential advantage for certain classes of problems, with profound implications for cybersecurity for instance. With the advent and development of quantum computers, cyberspace security can surely become the most critical problem for the Internet in near future. On contrary, prosaic quantum ...

  14. Artificial Intelligence in CyberSecurity

    Submission Deadline: 30 July 2019. IEEE Access invites manuscript submissions in the area of Artificial Intelligence in CyberSecurity. Recent studies show that Artificial Intelligence (AI) has resulted in advances in many scientific and technological fields, i.e., AI-based medicine, AI-based transportation, and AI-based finance.

  15. Enhancing Cyber Security Through Machine Learning: A ...

    In our increasingly digital world, cyber security has become a paramount concern, with threats evolving from malicious software to sophisticated hacking techniques. To effectively combat these challenges, the integration of machine learning techniques has garnered significant attention and relevance. This comprehensive analysis delves into the potential of leveraging machine learning to ...

  16. Proactive Curriculum for Cyber Security Education: A Model of Micro

    The demand for cyber security expertise, coupled with a shortage of qualified professionals, underscores the urgent need for comprehensive training programs and curriculum development. ... supported by robust research and industry collaboration, can significantly improve cybersecurity education and illustrates the approach through the current ...

  17. Cyber Security Challenges and Trends on Recent Technologies

    Protecting data and information systems (such as networking, computing systems, and cloud services, as well as software) is the goal of cyber security. Protecting personal information and computer networks using tools like firewalls, virus protection, and other software is necessary, but it isn't enough. Information technology (IT) and Internet services (ISPs) must take cyber-security into ...

  18. 2022 IEEE International Conference on Cyber Security and Resilience

    Read all the papers in 2022 IEEE International Conference on Cyber Security and Resilience (CSR) | IEEE Conference | IEEE Xplore

  19. White Paper

    Dependence on technology is growing, particularly since the COVID-19 pandemic. Yet, the safe use of technology depends on cybersecurity, which is failing to keep up. This failure can derail the global benefits that humanity should achieve from cyberspace and its technologies. Some four million professionals work in the cybersecurity field. IEEE could play a major role in this global community ...

  20. A Systematic Literature Review on Cloud Computing Security: Threats and

    Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and ...

  21. Cyber security: Threats and Challenges

    Nowadays, computer and network system maintenance is just as important as their protection. Grow into the network systems that are posted on many different websites with payment function and this is seen as websites needed sensitive information and are important to any organization. Viruses represent one of the most successful ways to attack these systems and their use is inevitably part of ...

  22. Internet of Things (IoT) Cybersecurity Research: A Review ...

    As an emerging technology, the Internet of Things (IoT) revolutionized the global network comprising of people, smart devices, intelligent objects, data, and information. The development of IoT is still in its infancy and many related issues need to be solved. IoT is a unified concept of embedding everything. IoT has a great chance to make the world a higher level of accessibility, integrity ...

  23. A Survey on Machine Learning Techniques for Cyber ...

    Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged cyberattacks. Cyber security techniques provide enhancements in security measures to detect and react against cyberattacks. The previously used security systems are no longer sufficient because cybercriminals are smart enough to evade ...

  24. Cyber Security in Digital Sector

    The term Cyber security usually refers to high tech, procedures, and usage anticipated that are intended to preserve networks, devices, programs, and information from assault, damage, or illegal access. Cyber security may also refer to as information technology. Cyber security is important because numerous bodies function with the help of security itself and, then the role of cyber security ...

  25. Technology Roadmapping: Standards of Healthcare Data Cybersecurity

    Summary <p>From the dot&#x2010;com boom to the internet of things (IoT) and machine learning (ML), the evolving digital world that people live in has brought new challenges for protecting personal data and information. IoT devices, smartphones, numerous apps, and more constantly collect personal health data with many positive intentions. However, the recent overturning of Roe vs. Wade by the ...