Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends

dc.authorscopusidAlaa Ali Hameed / 56338374100
dc.authorwosidAlaa Ali Hameed / ABI-8417-2020
dc.contributor.authorImam, Mohsin
dc.contributor.authorWajid, Mohd Anas
dc.contributor.authorBhushan, Bharat
dc.contributor.authorHameed, Alaa Ali
dc.contributor.authorJamil, Akhtar
dc.date.accessioned2025-04-18T10:33:33Z
dc.date.available2025-04-18T10:33:33Z
dc.date.issued2024
dc.departmentİstinye Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümü
dc.description.abstractFor the information technology sector, cybersecurity is essential. One of the main issues in the modern world is sending information from one system to another without letting the information out. Online crimes, which are on the rise daily, are the first thing that comes to mind when we think about cyber security. Various governments and businesses are adopting a number of actions to stop these cybercrimes. A lot of individuals are still quite worried about cyber security after taking many safeguards. This study’s primary goal is to examine the difficulties that modern technology-based cyber security faces, especially in light of the rising acceptance of cutting-edge innovations like server less computing, blockchain, and artificial intelligence (AI). The aim of this paper is to give readers a good overview of the most recent cyber security trends, ethics, and strategies. This study focuses on the present state of cyber security and the steps that may be taken to address the rising dangers posed by modern technology through a thorough investigation of the existing literature and actual case studies. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
dc.identifier.citationImam, M., Wajid, M. A., Bhushan, B., Hameed, A. A., & Jamil, A. (2023, September). Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends. In International Conference on Emerging Trends and Applications in Artificial Intelligence (pp. 570-588). Cham: Springer Nature Switzerland.
dc.identifier.doi10.1007/978-3-031-56728-5_47
dc.identifier.endpage588
dc.identifier.isbn978-303156727-8
dc.identifier.issn23673370
dc.identifier.scopus2-s2.0-85193568679
dc.identifier.scopusqualityQ4
dc.identifier.startpage570
dc.identifier.urihttps://hdl.handle.net/20.500.12713/7125
dc.identifier.volume960
dc.indekslendigikaynakScopus
dc.institutionauthorHameed, Alaa Ali
dc.institutionauthoridAlaa Ali Hameed / 0000-0002-8514-9255
dc.language.isoen
dc.publisherSpringer Science and Business Media Deutschland GmbH
dc.relation.ispartofLecture Notes in Networks and Systems
dc.relation.publicationcategoryDiğer
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.subjectBlockchain
dc.subjectCyber Security
dc.subjectCyber-Attack
dc.subjectCyber-Crime
dc.subjectInformation Security
dc.subjectSocial Media
dc.titleCyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends
dc.typeConference Object

Dosyalar

Lisans paketi
Listeleniyor 1 - 1 / 1
Küçük Resim Yok
İsim:
license.txt
Boyut:
1.17 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: