Exploring Critical Vulnerabilities in SIEM Implementation and SOC Service Procurement: An In-Depth Analysis of High-Risk Scenarios |
Ertuğrul AKBAŞ, Istanbul Esenyurt University, Turkey |
Volume : 15 volume number : 6 pdf |
A Framework for Securing Email Entrances and Mitigating Phishing Impersonation Attacks |
Wosah Peace Nmachi, University of Gloucestershire, United Kingdom |
Volume : 15 volume number : 6 pdf |
A Systematic Review on Machine Learning Insider Threat Detection Models, Datasets and Evaluation Metrics |
Everleen Nekesa Wanyonyi1,2, Silvance Abeka2 and Newton Masinde2, 1Murang’a University of Technology, Kenya, 2Jaramogi Oginga Odinga University of Science and Technology, Kenya |
Volume : 15 volume number : 6 pdf |