cyber security Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Authentic learning environment for in-service trainings of cyber security: a qualitative study

An empirical investigation into organization cyber security readiness from the it employee and manager perspectives, cyber security and digital forensics, ai-assisted computer network operations testbed for nature-inspired cyber security based adaptive defense simulation and analysis, the cyber security law, open-source ai platforms and the cyber security law, china’s data security policies leading to the cyber security law, cyber security frameworks.

Abstract: In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud. We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this paper, instead we take a theoretical approach to explain the procedures. We also model the threats posed by a malicious hacker seeking to induce disturbances in the functioning of a power transmission grid via the means of cyber-physical networks and systems. We use the strategy of a load redistribution attack, while clearly acknowledging that the hacker would form its decision policy on inadequate information. Our research indicate that inaccurate admittance values often cause moderately invasive cyber-attacks that still compromise the grid security, while inadequate capacity values result in comparatively less efficient attacks. In the end we propose a security framework for the security systems utilised by companies and corporations at global scale to conduct cyber-security related operations. Keywords: Electronic signature, Key pair, sequence modelling, hacker, power transmission grid, Threat response, framework.

Ransomware Attacks in History of Cyber World

Abstract: Technology advancement since last few decades creates cyber attack a critical issue. Cyber security has become an important part today. It has also become an important and crucial subject in the field of forensic science. Increased in the growth of internet technology and internet devices have increased the risk of cyber attack. Almost every organization today are depends on the internet and devices. There are many types of cyber attack. This paper is the detailed review about Ransomware attack. This paper is consisted about vast of the information about What is Ransomware Attack, how does it work, how ransomware attack emerged. After reading this paper you will learn about the ransomware attacks in history of cyber world. This will help you to learn and understand about ransomware attack, how to prevent yourself from ransomware attack. As a forensic science student, it is always important to be aware about the attacks that have happened in the history of cyber world. Before writing this paper, I have read and analyze many research paper and internet articles, so that I can write a detailed review paper which can help students and for the forensic awareness. Keywords: Cyberattack, Hacking, Ransomware, cyberworld, cyber security, ransomware, forensic, network security

Impact of Covid-19 on cyber Security

The Covid-19 pandemic is an unforeseen occurrence that took the world by storm. Governments and businesses were unprepared, hence the large-scale impact it continuously has on the planet. It has permanently revolutionised how we live, work and interact with technology. With this new way of living, businesses and governments had to adapt to a new form of survival, and so did cybercriminals; there was a surge in cyber threats due to our newfound dependence on technology. This paper emphasises the common types of cyber threats and the targeted industries. These attacks were more successful because people were uneasy and desperate, which gave the criminals more incentive to attack businesses. To avoid being a cyber target, I have provided recommendations against future threats.

Export Citation Format

Share document.

Cybersecurity Cover Image

  • Search by keyword
  • Search by citation

Page 1 of 4

Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud

The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a po...

  • View Full Text

Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks

Models based on MLP-Mixer architecture are becoming popular, but they still suffer from adversarial examples. Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolu...

Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods

Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure...

A circuit area optimization of MK-3 S-box

In MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit area. First, we classified th...

Intrusion detection system for controller area network

The rapid expansion of intra-vehicle networks has increased the number of threats to such networks. Most modern vehicles implement various physical and data-link layer technologies. Vehicles are becoming incre...

CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification

Due to the anonymous and contract transfer nature of blockchain cryptocurrencies, they are susceptible to fraudulent incidents such as phishing. This poses a threat to the property security of users and hinder...

Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity

In the realm of cybersecurity, the detection and analysis of obfuscated malware remain a critical challenge, especially in the context of memory dumps. This research paper presents a novel machine learning-bas...

BRITD: behavior rhythm insider threat detection with time awareness and user adaptation

Researchers usually detect insider threats by analyzing user behavior. The time information of user behavior is an important concern in internal threat detection.

research paper related to cyber security

F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android

Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network security. Machine learning and deep learning have become mainstream methods to analyze traffic, and ...

WAS: improved white-box cryptographic algorithm over AS iteration

The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment. In order to solve the issues of high storage cost and in...

Full-round impossible differential attack on shadow block cipher

Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices. Impossible dif...

Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP

The elliptic curve discrete logarithm problem (ECDLP) is a popular choice for cryptosystems due to its high level of security. However, with the advent of the extended Shor’s algorithm, there is concern that E...

Towards the transferable audio adversarial attack via ensemble methods

In recent years, deep learning (DL) models have achieved significant progress in many domains, such as autonomous driving, facial recognition, and speech recognition. However, the vulnerability of deep learnin...

LayerCFL: an efficient federated learning with layer-wised clustering

Federated Learning (FL) suffers from the Non-IID problem in practice, which poses a challenge for efficient and accurate model training. To address this challenge, prior research has introduced clustered FL (C...

A novel botnet attack detection for IoT networks based on communication graphs

Intrusion detection systems have been proposed for the detection of botnet attacks. Various types of centralized or distributed cloud-based machine learning and deep learning models have been suggested. Howeve...

research paper related to cyber security

Machine learning based fileless malware traffic classification using image visualization

In today’s interconnected world, network traffic is replete with adversarial attacks. As technology evolves, these attacks are also becoming increasingly sophisticated, making them even harder to detect. Fortu...

Research on privacy information retrieval model based on hybrid homomorphic encryption

The computational complexity of privacy information retrieval protocols is often linearly related to database size. When the database size is large, the efficiency of privacy information retrieval protocols is...

Performance evaluation of Cuckoo filters as an enhancement tool for password cracking

Cyberthreats continue their expansion, becoming more and more complex and varied. However, credentials and passwords are still a critical point in security. Password cracking can be a powerful tool to fight ag...

Tor network anonymity evaluation based on node anonymity

In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,...

Verifiable delay functions and delay encryptions from hyperelliptic curves

Verifiable delay functions (VDFs) and delay encryptions (DEs) are two important primitives in decentralized systems, while existing constructions are mainly based on time-lock puzzles. A disparate framework ha...

MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference

The popularity of small office and home office routers has brought convenience, but it also caused many security issues due to vulnerabilities. Black-box fuzzing through network protocols to discover vulnerabi...

A deep learning aided differential distinguisher improvement framework with more lightweight and universality

In CRYPTO 2019, Gohr opens up a new direction for cryptanalysis. He successfully applied deep learning to differential cryptanalysis against the NSA block cipher SPECK32/64, achieving higher accuracy than trad...

Attack based on data: a novel perspective to attack sensitive points directly

Adversarial attack for time-series classification model is widely explored and many attack methods are proposed. But there is not a method of attack based on the data itself. In this paper, we innovatively pro...

Improved lower bound for the complexity of unique shortest vector problem

Unique shortest vector problem (uSVP) plays an important role in lattice based cryptography. Many cryptographic schemes based their security on it. For the cofidence of those applications, it is essential to c...

research paper related to cyber security

Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms

Blockchain technology has gained widespread adoption in recent years due to its ability to enable secure and transparent record-keeping and data transfer. A critical aspect of blockchain technology is the use ...

Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities

Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly under...

EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector

Due to the importance of Critical Infrastructure (CI) in a nation’s economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems such as powe...

Generic attacks on small-state stream cipher constructions in the multi-user setting

Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight de...

Evicting and filling attack for linking multiple network addresses of Bitcoin nodes

Bitcoin is a decentralized P2P cryptocurrency. It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer, hiding users’ real network identities. Tradit...

Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk

Ethereum’s high attention, rich business, certain anonymity, and untraceability have attracted a group of attackers. Cybercrime on it has become increasingly rampant, among which scam behavior is convenient, c...

An efficient permutation approach for SbPN-based symmetric block ciphers

It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-...

IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data

Vertical Federated Learning (VFL) has many applications in the field of smart healthcare with excellent performance. However, current VFL systems usually primarily focus on the privacy protection during model ...

Intrusion detection systems for wireless sensor networks using computational intelligence techniques

Network Intrusion Detection Systems (NIDS) are utilized to find hostile network connections. This can be accomplished by looking at traffic network activity, but it takes a lot of work. The NIDS heavily utiliz...

Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm

It is not uncommon for malicious sellers to collude with fake reviewers (also called spammers) to write fake reviews for multiple products to either demote competitors or promote their products’ reputations, f...

Continuously non-malleable codes from block ciphers in split-state model

Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to achieve. It ensures with high probability that decoded message is either c...

Use of subword tokenization for domain generation algorithm classification

Domain name generation algorithm (DGA) classification is an essential but challenging problem. Both feature-extracting machine learning (ML) methods and deep learning (DL) models such as convolutional neural n...

A buffer overflow detection and defense method based on RISC-V instruction set extension

Buffer overflow poses a serious threat to the memory security of modern operating systems. It overwrites the contents of other memory areas by breaking through the buffer capacity limit, destroys the system ex...

research paper related to cyber security

Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset

In recent years, many researchers focused on unsupervised learning for network anomaly detection in edge devices to identify attacks. The deployment of the unsupervised autoencoder model is computationally exp...

Detecting compromised email accounts via login behavior characterization

The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society. Detecting compromised email accounts is more challenging than in the social network field,...

Security estimation of LWE via BKW algorithms

The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are a variety of LWE-solving methods, which can be cl...

A convolutional neural network to detect possible hidden data in spatial domain images

Hiding secret data in digital multimedia has been essential to protect the data. Nevertheless, attackers with a steganalysis technique may break them. Existing steganalysis methods have good results with conve...

Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs

Early attack detection is essential to ensure the security of complex networks, especially those in critical infrastructures. This is particularly crucial in networks with multi-stage attacks, where multiple n...

Towards the universal defense for query-based audio adversarial attacks on speech recognition system

Recently, studies show that deep learning-based automatic speech recognition (ASR) systems are vulnerable to adversarial examples (AEs), which add a small amount of noise to the original audio examples. These ...

FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems

Intrusion detection systems are increasingly using machine learning. While machine learning has shown excellent performance in identifying malicious traffic, it may increase the risk of privacy leakage. This p...

MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network

Cyber attackers have constantly updated their attack techniques to evade antivirus software detection in recent years. One popular evasion method is to execute malicious code and perform malicious actions only...

AppChainer: investigating the chainability among payloads in android applications

Statistics show that more than 80 applications are installed on each android smartphone. Vulnerability research on Android applications is of critical importance. Recently, academic researchers mainly focus on...

Enhancing non-profiled side-channel attacks by time-frequency analysis

Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of SCA, the number of attack data directly determines the performa...

An efficient confidentiality protection solution for pub/sub system

Publish/subscribe(pub/sub) systems are widely used in large-scale messaging systems due to their asynchronous and decoupled nature. With the population of pub/sub cloud services, the privacy protection problem...

NBA: defensive distillation for backdoor removal via neural behavior alignment

Recently, deep neural networks have been shown to be vulnerable to backdoor attacks. A backdoor is inserted into neural networks via this attack paradigm, thus compromising the integrity of the network. As soo...

Are our clone detectors good enough? An empirical study of code effects by obfuscation

Clone detection has received much attention in many fields such as malicious code detection, vulnerability hunting, and code copyright infringement detection. However, cyber criminals may obfuscate code to imp...

  • Editorial Board
  • Sign up for article alerts and news from this journal

Affiliated with

New Content Item

The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • EBSCO Discovery Service
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

2022 Citation Impact 3.1 - 2-year Impact Factor 4.8 - 5-year Impact Factor 2.071 - SNIP (Source Normalized Impact per Paper) 1.266 - SJR (SCImago Journal Rank)

2023 Speed 8 days submission to first editorial decision for all manuscripts (Median) 95 days submission to accept (Median)

2023 Usage  408,523 downloads 15 Altmetric mentions 

  • ISSN: 2523-3246 (electronic)

A Study of Cyber Security Issues and Challenges

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Book cover

  • Conference proceedings
  • © 2024

Cyber Security and Digital Forensics

Select Proceedings of the International Conference, ReDCySec 2023

  • Nihar Ranjan Roy   ORCID: https://orcid.org/0000-0001-6581-0803 0 ,
  • Sudeep Tanwar 1 ,
  • Usha Batra 2

Center for Cyber Security and Cryptology, Sharda University, Greater Noida, India

You can also search for this editor in PubMed   Google Scholar

Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, India

Department of computer science engineering, shri vishwakarma skill university, gurugram, india.

  • Presents research works in the field of cyber security and digital forensics
  • Provides original works presented at ReDCySec-2023
  • Serves as a reference for researchers and practitioners in academia and industry

Part of the book series: Lecture Notes in Networks and Systems (LNNS, volume 896)

Conference series link(s): REDCYSEC: International Conference on Recent Developments in Cyber Security

37 Accesses

Conference proceedings info: REDCYSEC 2023.

  • Table of contents
  • Other volumes

About this book

Editors and affiliations, about the editors, bibliographic information.

  • Publish with us

Buying options

  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (51 papers)

Front matter, a low-distortion reversible steganography method that conceals data in images with minimal distortion.

  • Mohammad Gauhar Nayab, Aditya Pratap Singh, Ritik Sharma, Gaurav Raj

Credit Card Fraud Detection Using ML Techniques

  • Samiratou Bonkoungou, Nihar Ranjan Roy, Nomel Haymes Axel-Elie Junior Ako, Alpna Mishra

An Effective Model for Binary and Multi-classification Based on RFE and XGBoost Methods in Intrusion Detection System

  • Swikrati Dubey, Chetan Gupta

ENCRYPTO: A Reliable and Efficient Mobile App for Password Management

  • Urmila Pilania, Manoj Kumar, Saurav Kumar Srivastava, Bhavika Dhingra, Lalit Adhana, Riya Gaur

A Survey on Path Key Establishment

  • Krishan Kumar, Priyanka Ahlawat

Detection of Phishing Link Using Different Machine Learning Techniques

  • Ashim Chaudhary, K. C. Krishna, Md Shadik, Dharm Raj

Secure Horizons: Advanced Protection Mechanisms for Holographic Data Storage Systems

  • Aviral Srivastava, Viral Parmar, Nishtha Chaudhari, Samir Patel

Security Flaw in TCP/IP and Proposed Measures

  • Sourav Kumar Upadhyay, Prakash Kumar

Static Analysis Approach of Malware Using Machine Learning

  • Aman Raj Pandey, Tushar Sharma, Subarna Basnet, Sonia Setia

Cyber-Attack Analysis Using Vulnerability Assessment and Penetration Testing

  • Vijayashree Budyal, A. V. Vaibhav, C. U. Akshay, Naveen Ishika, Gaonkar Unnathi

An Investigative Study on Security Aspects and Authentication Schemes for Internet of Vehicles

  • Preeti Dhankar, Bhargavi Singh, Priya Sharma

Amharic Language Hate Speech Detection Using Machine Learning

  • Abirham Ayenew, Uttam Chauhan

Cloud-Based Object Detection Model Using Amazon Rekognition

  • Darshita Singh, Deepak Arora

Ensemble Deep Model for Hate Speech Detection

  • Nitik Garg, Piyush Kumar Vikram, Nidant Rajora, Anurag Goel

Vitunix: A Lightweight and Secure Linux Distribution

  • Sandip Shinde, Gourav Suram, Mayur Khadde, Shrutika Gade, Vaishnavi Arthamwar, Palak Pardeshi

Multi-Key Fully Homomorphic Encryption Scheme Over the Integers

  • Rohitkumar R Upadhyay, Sahadeo Padhye

A Modest Approach Toward Cloud Security Hygiene

  • Sujal Patel, Rashmi Agarwal, Shinu Abhi, Ratan Jyoti

PrimeSwitch—Encryption and Decryption Algorithm Using RSA Key Generation

  • Priyanka Bhatele, Ishan Shivankar, Shreya Sabut, Shivansh Saraswat, Shraddha Patel, Shrey Chougule et al.

Hybrid Lightweight Cryptography Using AES and ECC for IoT Security

  • Neha N. Gharat, Lochan Jolly

Other Volumes

The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry.

  • Cyber Security
  • Cryptography
  • Quantum Resistant Cryptography
  • Digital Forensics
  • Blockchain Technology
  • Vulnerability Assessment
  • Cyber Physical System Security
  • Cyber Threat Intelligence
  • ReDCySec 2023
  • ReDCySec Proceedings

Nihar Ranjan Roy

Sudeep Tanwar

Nihar Ranjan Roy (life time member of Cryptology Research Society of India) is a passionate teacher working as an Associate Professor in the Department of Computer Science and Engineering, School of Engineering and Technology at Sharda University, Greater Noida. Dr. Roy is an active member of the Center for Cyber Security and Cryptography at Sharda University. He holds a Doctorate and M.Tech degree in Information Technology from Guru Gobind Singh Indraprastha University, Delhi, and  Bachelor of Engineering degree from Biju Patnaik University of Technology, Rourkela, Odisha formerly known as Utkal University, Orissa. He has over 20 years of teaching experience in reputed colleges and universities of Delhi-NCR. He has authored and co-authored several research papers in reputed journals and international conferences, and is a reviewer of many SCI indexed journals from IEEE, Wiley, Elsevier and Springer to name a few.  He has chaired several technical sessions and has reviewed papers of many international conferences from Springer, & IEEE.  Dr. Roy’s research areas includes: Computer Network, Cyber Security and Forensics, and Machine Learning. He has 4 published patents to his credit.

REDSET-2017 Springer CCIS

REDSET-2019 Springer CCIS

Sudeep Tanwar (Senior Member, IEEE) is working as a full professor at the Nirma University, India. He is also a Visiting Professor with Jan Wyzykowski University, Poland, and the University of Pitesti, Romania. He received B.Tech in 2002 from Kurukshetra University, India, M.Tech (Honor’s) in 2009 from Guru Gobind Singh Indraprastha University, Delhi, India and Ph.D. in 2016 with specialization inWireless Sensor Network. He has authored 04 books and edited 20 books, more than 300 technical articles, including top cited journals and conferences, such as IEEE TNSE, IEEE TVT, IEEE TII, IEEE TGCN, IEEE TCSC, IEEE IoTJ, IEEE NETWORKS, IEEE WCM, ICC, IWCMC, GLOBECOM, CITS, and INFOCOM. He initiated the research field of blockchain technology adoption in various verticals in the year 2017. His H-index as per Google Scholar and Scopus is 61 and 47, respectively. His research interests include blockchain technology, wireless sensor networks, fog computing, smart grid, and the IoT. He is a member of the Technical Committee on Tactile Internet of IEEE Communication Society. Recently, He has been awarded cash prize of Rs, 50,000 for publishing papers with 5+ Impact factor and publication of books with Springer, IET & CRC under the scheme of "Faculty Awards and Incentives" of Nirma University for the year 2019-2020. He has been awarded the Best Research Paper Awards from IEEE IWCMC-2021, IEEE ICCCA-2021, IEEE GLOBECOM 2018, IEEE ICC 2019, and Springer ICRIC-2019. He has won Dr KW Wong Annual Best Paper Prize (with 750 USD)  for 2021 sponsored by Elsevier (publishers of JISA). He has served many international conferences as a member of the Organizing Committee, such as the Publication Chair for FTNCT-2020, ICCIC 2020, and WiMob2019, and a General Chair for IC4S 2019, 2020, 2021, 2022, ICCSDF 2020, FTNCT 2021. He is also serving the editorial boards of COMCOM-Elsevier, IJCS-Wiley, Cyber Security and Applications- Elsevier, Frontiers of blockchain, SPY, Wiley, IJMIS journal of Inderscience, JCCE, and JSSS. He is also leading the ST Research Laboratory, where group members are working on the latest cutting-edge technologies.

In addition to her research, she successfully contributed to enhancing the employability of students through project assistance, teaching, and mentoring. She is actively working towards cyber security awareness sessions and playing a lead role to develop Indian Cyber Army.

Book Title : Cyber Security and Digital Forensics

Book Subtitle : Select Proceedings of the International Conference, ReDCySec 2023

Editors : Nihar Ranjan Roy, Sudeep Tanwar, Usha Batra

Series Title : Lecture Notes in Networks and Systems

DOI : https://doi.org/10.1007/978-981-99-9811-1

Publisher : Springer Singapore

eBook Packages : Engineering , Engineering (R0)

Copyright Information : The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024

Softcover ISBN : 978-981-99-9810-4 Published: 12 March 2024

eBook ISBN : 978-981-99-9811-1 Published: 11 March 2024

Series ISSN : 2367-3370

Series E-ISSN : 2367-3389

Edition Number : 1

Number of Pages : XXIV, 657

Number of Illustrations : 62 b/w illustrations, 211 illustrations in colour

Topics : Systems and Data Security , Communications Engineering, Networks , Forensic Science

Policies and ethics

  • Find a journal
  • Track your research

For enquiries call:

+1-469-442-0620

banner-in1

60+ Latest Cyber Security Research Topics for 2024

Home Blog Security 60+ Latest Cyber Security Research Topics for 2024

Play icon

The concept of cybersecurity refers to cracking the security mechanisms that break in dynamic environments. Implementing Cyber Security Project topics and cyber security thesis topics /ideas helps overcome attacks and take mitigation approaches to security risks and threats in real-time. Undoubtedly, it focuses on events injected into the system, data, and the whole network to attack/disturb it.

The network can be attacked in various ways, including Distributed DoS, Knowledge Disruptions, Computer Viruses / Worms, and many more. Cyber-attacks are still rising, and more are waiting to harm their targeted systems and networks. Detecting Intrusions in cybersecurity has become challenging due to their Intelligence Performance. Therefore, it may negatively affect data integrity, privacy, availability, and security. 

This article aims to demonstrate the most current Cyber Security Topics for Projects and areas of research currently lacking. We will talk about cyber security research questions, cyber security research questions, cyber security topics for the project, best cyber security research topics, research titles about cyber security and web security research topics.

Cyber Security Research Topics

List of Trending Cyber Security Research Topics for 2024

Digital technology has revolutionized how all businesses, large or small, work, and even governments manage their day-to-day activities, requiring organizations, corporations, and government agencies to utilize computerized systems. To protect data against online attacks or unauthorized access, cybersecurity is a priority. There are many Cyber Security Courses online where you can learn about these topics. With the rapid development of technology comes an equally rapid shift in Cyber Security Research Topics and cybersecurity trends, as data breaches, ransomware, and hacks become almost routine news items. In 2024, these will be the top cybersecurity trends.

A) Exciting Mobile Cyber Security Research Paper Topics

  • The significance of continuous user authentication on mobile gadgets. 
  • The efficacy of different mobile security approaches. 
  • Detecting mobile phone hacking. 
  • Assessing the threat of using portable devices to access banking services. 
  • Cybersecurity and mobile applications. 
  • The vulnerabilities in wireless mobile data exchange. 
  • The rise of mobile malware. 
  • The evolution of Android malware.
  • How to know you’ve been hacked on mobile. 
  • The impact of mobile gadgets on cybersecurity. 

B) Top Computer and Software Security Topics to Research

  • Learn algorithms for data encryption 
  • Concept of risk management security 
  • How to develop the best Internet security software 
  • What are Encrypting Viruses- How does it work? 
  • How does a Ransomware attack work? 
  • Scanning of malware on your PC 
  • Infiltrating a Mac OS X operating system 
  • What are the effects of RSA on network security ? 
  • How do encrypting viruses work?
  • DDoS attacks on IoT devices 

C) Trending Information Security Research Topics

  • Why should people avoid sharing their details on Facebook? 
  • What is the importance of unified user profiles? 
  • Discuss Cookies and Privacy  
  • White hat and black hat hackers 
  • What are the most secure methods for ensuring data integrity? 
  • Talk about the implications of Wi-Fi hacking apps on mobile phones 
  • Analyze the data breaches in 2024
  • Discuss digital piracy in 2024
  • critical cyber-attack concepts 
  • Social engineering and its importance 

D) Current Network Security Research Topics

  • Data storage centralization
  • Identify Malicious activity on a computer system. 
  • Firewall 
  • Importance of keeping updated Software  
  • wireless sensor network 
  • What are the effects of ad-hoc networks  
  • How can a company network be safe? 
  • What are Network segmentation and its applications? 
  • Discuss Data Loss Prevention systems  
  • Discuss various methods for establishing secure algorithms in a network. 
  • Talk about two-factor authentication

E) Best Data Security Research Topics

  • Importance of backup and recovery 
  • Benefits of logging for applications 
  • Understand physical data security 
  • Importance of Cloud Security 
  • In computing, the relationship between privacy and data security 
  • Talk about data leaks in mobile apps 
  • Discuss the effects of a black hole on a network system. 

F) Important Application Security Research Topics

  • Detect Malicious Activity on Google Play Apps 
  • Dangers of XSS attacks on apps 
  • Discuss SQL injection attacks. 
  • Insecure Deserialization Effect 
  • Check Security protocols 

G) Cybersecurity Law & Ethics Research Topics

  • Strict cybersecurity laws in China 
  • Importance of the Cybersecurity Information Sharing Act. 
  • USA, UK, and other countries' cybersecurity laws  
  • Discuss The Pipeline Security Act in the United States 

H) Recent Cyberbullying Topics

  • Protecting your Online Identity and Reputation 
  • Online Safety 
  • Sexual Harassment and Sexual Bullying 
  • Dealing with Bullying 
  • Stress Center for Teens 

I) Operational Security Topics

  • Identify sensitive data 
  • Identify possible threats 
  • Analyze security threats and vulnerabilities 
  • Appraise the threat level and vulnerability risk 
  • Devise a plan to mitigate the threats 

J) Cybercrime Topics for a Research Paper

  • Crime Prevention. 
  • Criminal Specialization. 
  • Drug Courts. 
  • Criminal Courts. 
  • Criminal Justice Ethics. 
  • Capital Punishment.
  • Community Corrections. 
  • Criminal Law. 

Research Area in Cyber Security

The field of cyber security is extensive and constantly evolving. Its research covers a wide range of subjects, including: 

  • Quantum & Space  
  • Data Privacy  
  • Criminology & Law 
  • AI & IoT Security

How to Choose the Best Research Topics in Cyber Security

A good cybersecurity assignment heading is a skill that not everyone has, and unfortunately, not everyone has one. You might have your teacher provide you with the topics, or you might be asked to come up with your own. If you want more research topics, you can take references from Certified Ethical Hacker Certification, where you will get more hints on new topics. If you don't know where to start, here are some tips. Follow them to create compelling cybersecurity assignment topics. 

1. Brainstorm

In order to select the most appropriate heading for your cybersecurity assignment, you first need to brainstorm ideas. What specific matter do you wish to explore? In this case, come up with relevant topics about the subject and select those relevant to your issue when you use our list of topics. You can also go to cyber security-oriented websites to get some ideas. Using any blog post on the internet can prove helpful if you intend to write a research paper on security threats in 2024. Creating a brainstorming list with all the keywords and cybersecurity concepts you wish to discuss is another great way to start. Once that's done, pick the topics you feel most comfortable handling. Keep in mind to stay away from common topics as much as possible. 

2. Understanding the Background

In order to write a cybersecurity assignment, you need to identify two or three research paper topics. Obtain the necessary resources and review them to gain background information on your heading. This will also allow you to learn new terminologies that can be used in your title to enhance it. 

3. Write a Single Topic

Make sure the subject of your cybersecurity research paper doesn't fall into either extreme. Make sure the title is neither too narrow nor too broad. Topics on either extreme will be challenging to research and write about. 

4. Be Flexible

There is no rule to say that the title you choose is permanent. It is perfectly okay to change your research paper topic along the way. For example, if you find another topic on this list to better suit your research paper, consider swapping it out. 

The Layout of Cybersecurity Research Guidance

It is undeniable that usability is one of cybersecurity's most important social issues today. Increasingly, security features have become standard components of our digital environment, which pervade our lives and require both novices and experts to use them. Supported by confidentiality, integrity, and availability concerns, security features have become essential components of our digital environment.  

In order to make security features easily accessible to a wider population, these functions need to be highly usable. This is especially true in this context because poor usability typically translates into the inadequate application of cybersecurity tools and functionality, resulting in their limited effectiveness. 

Writing Tips from Expert

Additionally, a well-planned action plan and a set of useful tools are essential for delving into Cyber Security Research Topics. Not only do these topics present a vast realm of knowledge and potential innovation, but they also have paramount importance in today's digital age. Addressing the challenges and nuances of these research areas will contribute significantly to the global cybersecurity landscape, ensuring safer digital environments for all. It's crucial to approach these topics with diligence and an open mind to uncover groundbreaking insights.

  • Before you begin writing your research paper, make sure you understand the assignment. 
  • Your Research Paper Should Have an Engaging Topic 
  • Find reputable sources by doing a little research 
  • Precisely state your thesis on cybersecurity 
  • A rough outline should be developed 
  • Finish your paper by writing a draft 
  • Make sure that your bibliography is formatted correctly and cites your sources. 
Discover the Power of ITIL 4 Foundation - Unleash the Potential of Your Business with this Cost-Effective Solution. Boost Efficiency, Streamline Processes, and Stay Ahead of the Competition. Learn More!

Studies in the literature have identified and recommended guidelines and recommendations for addressing security usability problems to provide highly usable security. The purpose of such papers is to consolidate existing design guidelines and define an initial core list that can be used for future reference in the field of Cyber Security Research Topics.

The researcher takes advantage of the opportunity to provide an up-to-date analysis of cybersecurity usability issues and evaluation techniques applied so far. As a result of this research paper, researchers and practitioners interested in cybersecurity systems who value human and social design elements are likely to find it useful. You can find KnowledgeHut’s Cyber Security courses online and take maximum advantage of them.

Frequently Asked Questions (FAQs)

Businesses and individuals are changing how they handle cybersecurity as technology changes rapidly - from cloud-based services to new IoT devices. 

Ideally, you should have read many papers and know their structure, what information they contain, and so on if you want to write something of interest to others. 

The field of cyber security is extensive and constantly evolving. Its research covers various subjects, including Quantum & Space, Data Privacy, Criminology & Law, and AI & IoT Security. 

Inmates having the right to work, transportation of concealed weapons, rape and violence in prison, verdicts on plea agreements, rehab versus reform, and how reliable are eyewitnesses? 

Profile

Mrinal Prakash

I am a B.Tech Student who blogs about various topics on cyber security and is specialized in web application security

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cyber Security Batches & Dates

Course advisor icon

Watch CBS News

Biden team, UnitedHealth struggle to restore paralyzed billing systems after cyberattack

By Darius Tahir, Bernard J. Wolfson and Daniel Chang

Updated on: March 8, 2024 / 8:10 AM EST / KFF Health News

Margaret Parsons, one of three dermatologists at a 20-person practice in Sacramento, California, is in a bind.

Since a Feb. 21 cyberattack on a previously obscure medical payment processing company, Change Healthcare, Parsons said, she and her colleagues haven't been able to electronically bill for their services.

She heard Noridian Healthcare Solutions, California's Medicare payment processor, was not accepting paper claims as of earlier this week, she said. And paper claims can take three to six months to result in payment anyway, she estimated.

"We will be in trouble in very short order, and are very stressed," she said in an interview with KFF Health News.

A California Medical Association spokesperson said March 7 that the Centers for Medicare and Medicaid Services had agreed in a meeting to encourage payment processors like Noridian to accept paper claims. A Noridian spokesperson referred questions to CMS.

The American Hospital Association calls the suspected ransomware attack on Change Healthcare , a unit of insurance giant UnitedHealth Group's Optum division, "the most significant and consequential incident of its kind against the U.S. health care system in history." While doctors' practices, hospital systems and pharmacies struggle to find workarounds, the attack is exposing the health system's broad vulnerability to hackers, as well as shortcomings in the Biden administration's response.

To date, government has relied on more voluntary standards to protect the health care system's networks, Beau Woods, a co-founder of the cyber advocacy group I Am The Cavalry, said. But "the purely optional, do-this-out-of-the-goodness-of-your-heart model clearly is not working," he said. The federal government needs to devote greater funding, and more focus, to the problem, he said.

The crisis will take time to resolve. Comparing the Change attack to others against parts of the health care system, "we have seen it generally takes a minimum of 30 days to restore core systems," said John Riggi , the hospital association's national adviser on cybersecurity.

In a March 7 statement, UnitedHealth Group said two services — related to electronic payments and medical claims — would be restored later in the month. "While we work to restore these systems, we strongly recommend our provider and payer clients use the applicable workarounds we have established," the company said.

"We're determined to make this right as fast as possible," said company CEO Andrew Witty.

Providers and patients are meanwhile paying the price. Reports of people paying out-of-pocket to fill vital prescriptions have been common. Independent physician practices are particularly vulnerable.

"How can you pay staff, supplies, malpractice insurance — all this — without revenue?" said Stephen Sisselman, an independent primary care physician on Long Island in New York. "It's impossible."

Jackson Health System, in Miami-Dade County, Florida, may miss out on as much as $30 million in payments if the outage lasts a month, said Myriam Torres , its chief revenue officer. Some insurers have offered to mail paper checks.

Relief programs announced by both UnitedHealth and the federal government have been criticized by health providers, especially hospitals. Sisselman said Optum offered his practice, which he said has revenue of hundreds of thousands of dollars a month, a loan of $540 a week. Other providers and hospitals interviewed by KFF Health News said their offers from the insurer were similarly paltry.

In its March 7 statement, the company said it would offer new financing options to providers.

Providers pressure government to act

On March 5, almost two weeks after Change first reported what it initially called a cybersecurity "issue," the Health and Human Services Department announced several assistance programs for health providers.

One recommendation is for insurers to advance payments for Medicare claims — similar to a program that aided health systems early in the pandemic. But physicians and others are worried that would help only hospitals, not independent practices or providers.

Anders Gilberg , a lobbyist with the Medical Group Management Association, which represents physician practices, posted on X , formerly known as Twitter, that the government "must require its contractors to extend the availability of accelerated payments to physician practices in a similar manner to which they are being offered to hospitals."

HHS spokesperson Jeff Nesbit said the administration "recognizes the impact" of the attack and is "actively looking at their authority to help support these critical providers at this time and working with states to do the same." He said Medicare is pressing UnitedHealth Group to "offer better options for interim payments to providers."

Another idea from the federal government is to encourage providers to switch vendors away from Change. Sisselman said he hoped to start submitting claims through a new vendor within 24 to 48 hours. But it's not a practicable solution for everyone.

Torres said suggestions from UnitedHealth and regulators that providers change clearinghouses, file paper claims, or expedite payments are not helping.

"It's highly unrealistic," she said of the advice. "If you've got their claims processing tool, there's nothing you can do."

Mary Mayhew , president of the Florida Hospital Association, said her members have built up sophisticated systems reliant on Change Healthcare. Switching processes could take 90 days — during which they'll be without cash flow, she said. "It's not like flipping a switch."

Nesbit acknowledged switching clearinghouses is difficult, "but the first priority should be resuming full claims flow," he said. Medicare has directed its contractors and advised insurers to ease such changes, he added.

Health care leaders including state Medicaid directors have called on the Biden administration to treat the Change attack similarly to the pandemic — a threat to the health system so severe that it demands extraordinary flexibility on the part of government insurance programs and regulators.

Beyond the money matters — critical as they are — providers and others say they lack basic information about the attack. UnitedHealth Group and the American Hospital Association have held calls and published releases about the incident; nevertheless, many still feel they're in the dark.

Riggi of the AHA wants more information from UnitedHealth Group. He said it's reasonable for the conglomerate to keep some information closely held, for example if it's not verified or to assist law enforcement. But hospitals would like to know how the breach was perpetrated so they can reinforce their own defenses.

"The sector is clamoring for more information, ultimately to protect their own organizations," he said.

Rumors have proliferated.

"It gets a little rough: Any given day you're going to have to pick and choose who to believe," Saad Chaudhry, an executive at Maryland hospital system Luminis Health, told KFF Health News. "Do you believe these thieves? Do you believe the organization itself, that has everything riding on their public image, who have incentives to minimize this kind of thing?"

What happens next?

Wired Magazine reported that someone paid the ransomware gang believed to be behind the attack $22 million in bitcoin. If that was indeed a ransom intended to resolve some aspect of the breach, it's a bonanza for hackers.

Cybersecurity experts say some hospitals that have suffered attacks have faced ransom demands for as little as $10,000 and as much as $10 million. A large payment to the Change hackers could incentivize more attacks.

"When there's gold in the hills, there's a gold rush," said Josh Corman , another co-founder of I Am The Cavalry and a former federal cybersecurity official.

Longer-term, the attack intensifies questions about how the private companies that comprise the U.S. health system and the government that regulates them are defending against cyberthreats. Attacks have been common: Thieves and hackers, often believed to be sponsored or harbored by countries like Russia and North Korea, have knocked down systems in the United Kingdom's National Health Service, pharma giants like Merck and numerous hospitals .

The FBI reported 249 ransomware attacks against health care and public health organizations in 2023, but Corman believes the number is higher.

But federal efforts to protect the health system are a patchwork, according to cybersecurity experts. While it's not yet clear how Change was hacked, experts have warned a breach can occur through a phishing link in an email or more exotic pathways. That means regulators need to consider hardening all kinds of products.

One example of the slow-at-best efforts to mend these defenses concerns medical devices. Devices with outdated software could provide a pathway for hackers to get into a hospital network or simply degrade its functioning.

The FDA recently gained more authority to assess medical devices' digital defenses and issue safety communications about them. But that doesn't mean vulnerable machines will be removed from hospitals. Products often linger because they're expensive to take out of service or replace.

Senator Mark Warner (D-Va.) has previously proposed a "Cash for Clunkers"-type program to pay hospitals to update the cybersecurity of their old medical devices, but it was "never seriously pursued," Warner spokesperson Rachel Cohen said. Riggi said such a program might make sense, depending on how it's implemented.

Weaknesses in the system are widespread and often don't occur to policymakers immediately. Even something as prosaic as a heating and air conditioning system can, if connected to a hospital's internet network, be hacked and allow the institution to be breached.

But erecting more defenses requires more people and resources — which often aren't available. In 2017, Woods and Corman assisted on an HHS report surveying the digital readiness of the health care sector. As part of their research, they found a slice of wealthier hospitals had the information technology staff and resources to defend their systems — but the vast majority had no dedicated security staff. Corman calls them "target-rich but cyber-poor."

"The desire is there. They understand the importance," Riggi said. "The issue is the resources."

HHS has proposed requiring minimum cyberdefenses for hospitals to participate in Medicare, a vital source of revenue for the entire industry. But Riggi says the AHA won't support it.

"We oppose unfunded mandates and oppose the use of such a harsh penalty," he said.

This article was produced by KFF Health News , formerly known as Kaiser Health News (KHN), a national newsroom that produces in-depth journalism about health issues and is one of the core operating programs at KFF — the independent source for health policy research, polling, and journalism. KFF Health News is the publisher of California Healthline , an editorially independent service of the California Health Care Foundation .

  • UnitedHealth Group
  • Cyberattack
  • Health Care

More from CBS News

Despite taking jabs at Trump at D.C. roast, Biden also warns of threat to democracy

Transcript: UNICEF executive director Catherine Russell on "Face the Nation," March 17, 2024

Millions of kids have long COVID and symptoms can be "heartbreaking"

Transcript: Reps. Raja Krishnamoorthi and Mike Gallagher on "Face the Nation," March 17, 2024

IMAGES

  1. (PDF) A Study Of Cyber Security Challenges And Its Emerging Trends On

    research paper related to cyber security

  2. (PDF) A REVIEW PAPER ON CYBER SECURITY

    research paper related to cyber security

  3. Essay on Cyber Security

    research paper related to cyber security

  4. Essay on Cyber Security

    research paper related to cyber security

  5. Example Of Cyber Security Research Paper

    research paper related to cyber security

  6. (PDF) CYBER SECURITY: CHALLENGES AND THE WAY FORWARD

    research paper related to cyber security

VIDEO

  1. Cyber Security Question Paper 2022 |SPPU Question Paper 2022 |March 2022 Question Paper |TYBBA(CA)

  2. Why Study Cybersecurity Abroad?

  3. Cyber Security tutorials by Mr. Shoaib Ahmed Sir

  4. cyber security question paper December 2023 #diploma

  5. The WORST Beginner Cyber Security Mistakes Everyone Makes (Avoid These)

  6. cyber security makeup exam question paper 2023 diploma in computer science

COMMENTS

  1. Research paper A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

    The term "policy" is used in a variety of areas related to cyber-security, and refers to information distribution rules and regulations, private sector goals for data conservation, system operations strategies for technology control. However, in the works of this field, the term cyber-security policy is used for different purposes.

  2. Journal of Cybersecurity

    Call for Papers. Journal of Cybersecurity is soliciting papers for a special collection on the philosophy of information security. This collection will explore research at the intersection of philosophy, information security, and philosophy of science. Find out more.

  3. Artificial intelligence for cybersecurity: Literature review and future

    Cyber supply chain security. Cyber supply chain security requires a secure integrated network between the incoming and outgoing chain's subsystems. Therefore, it is essential to understand and predict threats using both internal and threat intelligence resources to limit the disruption of the business.

  4. cyber security Latest Research Papers

    Find the latest published documents for cyber security, Related hot topics, top authors, the most cited documents, and related journals. ... Before writing this paper, I have read and analyze many research paper and internet articles, so that I can write a detailed review paper which can help students and for the forensic awareness. Keywords ...

  5. Cyber risk and cybersecurity: a systematic review of data ...

    Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020, indicating an increase of more than 50% since 2018. With the average cyber insurance claim rising from USD 145,000 in 2019 to USD 359,000 in 2020, there is a growing necessity for better cyber information sources, standardised databases, mandatory reporting and public awareness. This research analyses ...

  6. (PDF) A Systematic Literature Review on the Cyber Security

    This paper offers a comprehensive overview of current research into cyber security. We commence, section 2 provides the cyber security related work, in section 3, by introducing about cyber security.

  7. A systematic literature review of blockchain cyber security

    The paper must contain information related to blockchain or associated distributed ledger technologies: ... Releasing open-source software and dataset, and engaging with community: blockchain cyber security research is fractured between academia and the developer community. In order to bridge this gap, efforts are required by academic ...

  8. AI-Driven Cybersecurity: An Overview, Security Intelligence ...

    Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or unauthorized access. To intelligently solve today's various cybersecurity issues, popular AI techniques involving machine learning and deep learning methods, the concept of ...

  9. High-Impact Research

    Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight . Journal of Cybersecurity, Volume 8, Issue 1, 2022, ... In this study, we examine the nature of losses from cyber-related events across different risk categories and business sectors. Using a leading industry dataset of cyber events, we evaluate ...

  10. Journal of Cybersecurity and Privacy

    To cover this research gap, this paper summarizes the recent state-of-the-art (SOTA) attribute-centric anonymization methods and synthetic data based developments, along with the experimental details. We report various innovative privacy-enhancing technologies that are used to protect the privacy of personal data enclosed in various forms.

  11. Articles

    In the realm of cybersecurity, the detection and analysis of obfuscated malware remain a critical challenge, especially in the context of memory dumps. This research paper presents a novel machine learning-bas... Md. Alamgir Hossain and Md. Saiful Islam. Cybersecurity 2024 7 :16. Research Published on: 25 January 2024.

  12. Cyber Security Threats and Vulnerabilities: A Systematic ...

    There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed ...

  13. A Systematic Literature Review on the Cyber Security

    This paper offers a comprehensive overview of current research into cyber security. We commence, section 2 provides the cyber security related work, in section 3, by introducing about cyber security. Section 4 outlines the history of cyber security. Section 5 why cyber security is essential, and section 6 cyber security types.

  14. Artificial intelligence in cyber security: research advances

    This paper also identifies a number of limitations and challenges, and based on the findings, a conceptual human-in-the-loop intelligence cyber security model is presented. References Adekunle YA, Okolie SO, Adebayo AO, Ebiesuwa S, Ehiwe DD (2019) Holistic exploration of gaps vis-à-vis artificial intelligence in automated teller machine and ...

  15. A Systematic Literature Review on Cyber Threat Intelligence for ...

    Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and opportunities inside the cyber domain. This research investigates how companies can employ CTI ...

  16. Cybersecurity: Past, Present and Future

    The term Cyber Security starts gaining popularity from the year 2017 and achieves peak popularity in the years 2019 and 2020. Whereas, the other two terms show a steady ... To keep pace with the advancements in the new digital technologies like IoTs and cloud, there is a need to expand research and develop novel cybersecurity methods and tools to

  17. Cyber Security Research Papers

    Cyber Security Research Papers. Master's degree candidates at SANS.edu conduct research that is relevant, has real world impact, and often provides cutting-edge advancements to the field of cybersecurity, all under the guidance and review of our world-class instructors. Learn about the Master's Degree Program.

  18. A Study of Cyber Security Issues and Challenges

    The paper first explains what cyber space and cyber security is. Then the costs and impact of cyber security are discussed. The causes of security vulnerabilities in an organization and the challenging factors of protecting an organization from cybercrimes are discussed in brief. Then a few common cyber-attacks and the ways to protect from them ...

  19. Cyber Security and Applications

    This Cyber Security and Applications (CSA) journal focuses on cyber breaches, cyber-attacks, quantum computing based encryption and decryption techniques and cyber defense tools for improving level of cyber security. In addition to this, CSA also welcomes the researchers to submit the papers related to advance methods and tools for improving ...

  20. Effect of Supply Chain Resilience on USA Cyber Security

    This paper seeks to argue this lapse by providing insights on pragmatic and effective strategies in mitigating cyber security threats within the supply chains but focusing on the vital role of ...

  21. Cyber Security and Digital Forensics

    Presents research works in the field of cyber security and digital forensics; Provides original works presented at ReDCySec-2023; ... He has been awarded the Best Research Paper Awards from IEEE IWCMC-2021, IEEE ICCCA-2021, IEEE GLOBECOM 2018, IEEE ICC 2019, and Springer ICRIC-2019. He has won Dr KW Wong Annual Best Paper Prize (with 750 USD ...

  22. Top 10 Cybersecurity Research Papers to Know About in 2022

    The research yielded that maximum higher-education students would prefer the cyberbullying to stop, but by avoiding fighting back. Also, it revealed that male students are more involved in cyberbullying than female students. Research Paper on Cyber Security by Mrs. Ashwini Sheth, Mr. Sachin Bhosale, and Mr. Farish Kurupkar

  23. 60+ Latest Cyber Security Research Topics for 2024

    Here is a list of research ideas along with the cyber security research areas, tips to choose the best topic from experts and more. For enquiries call: +1-469-442-0620. For enquiries call: +1-469-442-0620. All Courses. ... Exciting Mobile Cyber Security Research Paper Topics. The significance of continuous user authentication on mobile gadgets.

  24. (PDF) Research Paper on Cyber Security

    Research Paper on Cyber Security. July 2022. Venky Kumar. In the current world that is run by technology and network connections, it is crucial to know what cybersecurity is and to be able to use ...

  25. Research communities in cyber security vulnerability assessments: A

    The automotive subcommunity focuses on research that tests the cyber security of vehicular units and related sub-parts such as in-vehicle networks, the controller area network (CAN), and electronic control units (ECU). The CAN bus is an internal vehicular network that connects various parts and systems of the vehicle.

  26. Biden team, UnitedHealth struggle to restore paralyzed billing systems

    Margaret Parsons, one of three dermatologists at a 20-person practice in Sacramento, California, is in a bind. Since a Feb. 21 cyberattack on a previously obscure medical payment processing ...