Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends
dc.authorscopusid | Alaa Ali Hameed / 56338374100 | |
dc.authorwosid | Alaa Ali Hameed / ABI-8417-2020 | |
dc.contributor.author | Imam, Mohsin | |
dc.contributor.author | Wajid, Mohd Anas | |
dc.contributor.author | Bhushan, Bharat | |
dc.contributor.author | Hameed, Alaa Ali | |
dc.contributor.author | Jamil, Akhtar | |
dc.date.accessioned | 2025-04-18T10:33:33Z | |
dc.date.available | 2025-04-18T10:33:33Z | |
dc.date.issued | 2024 | |
dc.department | İstinye Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümü | |
dc.description.abstract | For the information technology sector, cybersecurity is essential. One of the main issues in the modern world is sending information from one system to another without letting the information out. Online crimes, which are on the rise daily, are the first thing that comes to mind when we think about cyber security. Various governments and businesses are adopting a number of actions to stop these cybercrimes. A lot of individuals are still quite worried about cyber security after taking many safeguards. This study’s primary goal is to examine the difficulties that modern technology-based cyber security faces, especially in light of the rising acceptance of cutting-edge innovations like server less computing, blockchain, and artificial intelligence (AI). The aim of this paper is to give readers a good overview of the most recent cyber security trends, ethics, and strategies. This study focuses on the present state of cyber security and the steps that may be taken to address the rising dangers posed by modern technology through a thorough investigation of the existing literature and actual case studies. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. | |
dc.identifier.citation | Imam, M., Wajid, M. A., Bhushan, B., Hameed, A. A., & Jamil, A. (2023, September). Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends. In International Conference on Emerging Trends and Applications in Artificial Intelligence (pp. 570-588). Cham: Springer Nature Switzerland. | |
dc.identifier.doi | 10.1007/978-3-031-56728-5_47 | |
dc.identifier.endpage | 588 | |
dc.identifier.isbn | 978-303156727-8 | |
dc.identifier.issn | 23673370 | |
dc.identifier.scopus | 2-s2.0-85193568679 | |
dc.identifier.scopusquality | Q4 | |
dc.identifier.startpage | 570 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12713/7125 | |
dc.identifier.volume | 960 | |
dc.indekslendigikaynak | Scopus | |
dc.institutionauthor | Hameed, Alaa Ali | |
dc.institutionauthorid | Alaa Ali Hameed / 0000-0002-8514-9255 | |
dc.language.iso | en | |
dc.publisher | Springer Science and Business Media Deutschland GmbH | |
dc.relation.ispartof | Lecture Notes in Networks and Systems | |
dc.relation.publicationcategory | Diğer | |
dc.rights | info:eu-repo/semantics/closedAccess | |
dc.subject | Blockchain | |
dc.subject | Cyber Security | |
dc.subject | Cyber-Attack | |
dc.subject | Cyber-Crime | |
dc.subject | Information Security | |
dc.subject | Social Media | |
dc.title | Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends | |
dc.type | Conference Object |
Dosyalar
Lisans paketi
1 - 1 / 1
Küçük Resim Yok
- İsim:
- license.txt
- Boyut:
- 1.17 KB
- Biçim:
- Item-specific license agreed upon to submission
- Açıklama: