The frequency and severity of cyber-attacks have surged, causing detrimental impacts on businesses and their operations. To counter the ever-evolving cyber threats, there's a growing need for robust risk assessment systems capable of effectively pinpointing and mitigating potential vulnerabilities. This paper introduces an innovative risk assessment technique rooted in both Machine Learning and graph theory, which offers a method to evaluate and foresee companies' susceptibility to cybersecurity threats. In pursuit of this objective, four Machine Learning algorithms (Random Forest, AdaBoost, XGBoost, Multi- Layer Perceptron (MLP)) will be employed, trained, and assessed using the UNSW-NB15 dataset that has a hybrid of real modern normal a...
Rapid shifting by government sectors and companies to provide their services and products over the i...
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
Networks have an increasing influence on our modern life, making Cybersecurity an important field of...
Machine learning and natural language processing (NLP) can help describe and make inferences on the ...
The extensive sharing of personal information over networks has given rise to an emerging malware in...
All users place a high value on information security. Over the last few decades, cyber security has ...
Over the last two years, machine learning has become rapidly utilized in cybersecurity, rising from ...
Cyber risk assessment is one of the top priorities of modern organizations and companies, owing to t...
The significant recent growth in digitization has been accompanied by a rapid increase in cyber atta...
Cyberattacks have increased in number and severity, negatively impacting businesses and their servic...
Our paramount task is to examine and detect network attacks, is one of the daunting tasks because th...
In recent years, there has been an immense research interest in applying Machine Learning (ML) for d...
Purpose- Cyber resilience in cyber supply chain (CSC) systems security has become inevitable as att...
Rapid shifting by government sectors and companies to provide their services and products over the i...
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
Networks have an increasing influence on our modern life, making Cybersecurity an important field of...
Machine learning and natural language processing (NLP) can help describe and make inferences on the ...
The extensive sharing of personal information over networks has given rise to an emerging malware in...
All users place a high value on information security. Over the last few decades, cyber security has ...
Over the last two years, machine learning has become rapidly utilized in cybersecurity, rising from ...
Cyber risk assessment is one of the top priorities of modern organizations and companies, owing to t...
The significant recent growth in digitization has been accompanied by a rapid increase in cyber atta...
Cyberattacks have increased in number and severity, negatively impacting businesses and their servic...
Our paramount task is to examine and detect network attacks, is one of the daunting tasks because th...
In recent years, there has been an immense research interest in applying Machine Learning (ML) for d...
Purpose- Cyber resilience in cyber supply chain (CSC) systems security has become inevitable as att...
Rapid shifting by government sectors and companies to provide their services and products over the i...
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...