Yahoo Web Search

Search results

  1. IES invest a great deal of money to control security threats and IT environment protection with the use of combined tools from antivirus software/ antispyware, firewalls, detection systems, intrusion prevention and filtering content software [4].

  2. Apr 20, 2023 · 1. Introduction. 2. Method. 3. Results. 4. Discussion. 5. Conclusion. Abstract. Purpose. Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness.

  3. Feb 17, 2022 · Avila et al. conducted a systematic literature review on the use of security logs for data leak detection. They recommended a new classification of information leak, which uses the GDPR principles, identified the most widely publicly available dataset for threat detection, described the attack types in the datasets and the algorithms used for ...

  4. May 23, 2023 · This systematic literature review examines the existing research relating to information security in chatbots, identifying the potential threats, proposed solutions, and future directions for research.

  5. Aug 1, 2022 · Systematic literature review of security assurance of the ICT and CPSs. •. Study the challenges and gaps of existing assurance challenges and solutions. •. Discussed the limitations of the present methods and future research directions. •. Review of assurance requirements, processes, and activities. •.

  6. Jan 1, 2019 · Based on RQ 1 of a systematic literature review, information and computer security journal is the most important published journal information security compliance topic. For five years, researcher objective is finding influencing factors employee comply with information security policy, behaviour intention and measure compliance.

  7. People also ask

  8. Feb 28, 2007 · This paper identifies four security issues (access to Information Systems, secure communication, security management, development of secure Information Systems), and examines the extent to...