CYBER SECURITY-2020



cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
free download

Abstract Deep learning (DL), a novel research direction in machine learning (ML) field, has achieved great success in many classical artificial intelligence (AI) tasks in comparison to classical ML algorithms (CMLAs). DL architectures are relatively recent and currently wisely used for diverse

CYBER SECURITY FRAMEWORK FOR NIGERIAN CIVIL AVIATION AUTHORITY, HEADQUARTERS
free download

The practice of defending assets from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction is as ancient as mans existence on earth. Cybersecurity, information security , and computer security are further attempts of

A reliable next generation cyber security architecture for industrial internet of things environment.
free download

Architectural changes are happening in the modern industries due to the adaption and the deployment of Internet of Things (IoT)‟ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology

A STUDY ON CYBER SECURITY LESGISLATION
free download

The cyber space amplitude and the cyber threats variety pose a great challenge in protecting the internet users, given the attackers capability of acting from anywhere in the world, the impact that an attack might have on real life, and also the difficulty of reducing

INTEGRATED SAFETY AND CYBER SECURITY ANALYSIS FOR BUILDING SUSTAINABLE CYBER PHYSICAL SYSTEM AT NUCLEAR POWER PLANTS: A
free download

Nuclear power plants (NPP) install digital instrumentation and control (IC) systems and physical protection systems (PPS) for its safe, precise operation using software-intensive systems and interconnected digital components respectively. The both of these software

Analysis of Cyber Security Threat Environment and Information Security System of Financial Industry Under New Situation
free download

With the rise of Internet finance model, the deterioration of external security environment and the increasing complexity of its own system architecture, the banking industry is facing increasingly severe network security threats. This paper analyses the network security

DEEP LEARNING APPLICATIONS IN CYBER SECURITY : A COMPREHENSIVE REVIEW, CHALLENGES AND PROSPECTS
free download

Deep Learning applications are starting to pervade every commercial and technological sector. This paper surveys deep learning (DL) methods for cyber security applications, highlights the security considerations when using deep learning networks and presents

Evaluating Contemporary Digital Awareness Programs for Future Application within the Cyber Security Social Engineering Domain
free download

Social engineering is a rising threat to individuals and organizations, causing massive losses every day. Contemporary and innovative methods to mitigate these threats are needed today more than any other time in the past. This study aimed to assess the different

Effect of Outdated Technology in Banking Industry Need of Advance Technology to Eliminate Cyber Security Threats, Track illegal transaction and fraud and
free download

Technology is changing the way businesses operate and deliver products to consumers in the banking sectors. An industry that has seen immense developments or innovation in recent years. There are key regions that are consolidating innovation into money related

CYBER -WARFARE: IMPLICATIONS FOR THE NATIONAL SECURITY OF PAKISTAN
free download

Computer networks serve as the backbone of modern-day information and communications technologies. These networks have no physical boundaries that contain important data and information critical to any states national security , which is vulnerable to cyber -attacks in the

TRUSTED DELEGATION CYBER PHYSICAL DATA SECURITY MOBILE HEALTHCARE
free download

Attribute-based encryption (ABE) offers a promising solution for flexible access control over sensitive personal health records in a mobile healthcare system on top of a public cloud infrastructure. However, ABE cannot be simply applied to lightweight devices due to its

A Hybrid Game Theory and Reinforcement Learning Approach for Cyber -Physical Systems Security
free download

Cyber -Physical Systems (CPS) are monitored and controlled by Supervisory Control and Data Acquisition (SCADA) systems that use advanced computing, sensors, control systems, and communication networks. At first, CPS and SCADA systems were protected and secured