2019 Second International Conference on Latest Trends in Electrical Engineering and Computing Technologies (INTELLECT) 2019
DOI: 10.1109/intellect47034.2019.8955459
|View full text |Cite
|
Sign up to set email alerts
|

Problems and Vulnerabilities of Ethical Hacking in Pakistan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 4 publications
0
3
0
1
Order By: Relevance
“…Furthermore, pioneering approaches, such as the Low-Latency and High-Throughput Multipath routing technique, as elucidated by Ramachandran et al (2022), have been devised to counter novel threats such as black hole attacks. Meanwhile, Imran et al (2019) have employed machine learning and nature-inspired algorithms to scrutinize credit card data, fortifying fraud prevention measures. Against this backdrop, integrating artificial intelligence, machine learning, and IoT technologies has heralded a new era in cybercrime analysis and cybersecurity enhancement, a paradigm eloquently underscored by Sood and Enbody (2013) and epitomized in the broader research landscape.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, pioneering approaches, such as the Low-Latency and High-Throughput Multipath routing technique, as elucidated by Ramachandran et al (2022), have been devised to counter novel threats such as black hole attacks. Meanwhile, Imran et al (2019) have employed machine learning and nature-inspired algorithms to scrutinize credit card data, fortifying fraud prevention measures. Against this backdrop, integrating artificial intelligence, machine learning, and IoT technologies has heralded a new era in cybercrime analysis and cybersecurity enhancement, a paradigm eloquently underscored by Sood and Enbody (2013) and epitomized in the broader research landscape.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Different social media companies and cellular companies do not cooperate with FIA's cyber need to establish a mutual legal assistance all out information for solving a case. In Pakistan, hacking is relatively new type of cybercrimes for the federal investigation agencies (Imran, et al, 2019). Cybercrimes wing has lodged 1576 complaints of banking sector in 2022.…”
Section: Case Study Of Pakistanmentioning
confidence: 99%
“…While the current security devices attention to the appearance of the violence, somewhat after the attacker. Further, it focused on the attacker behavior analysis due to it being a challenging problem [26], [27], [28],[29], [30], [31], [32], [33],[34], [35],[36],[37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48],[49], [50].…”
Section: Bsummary Of Other Associated Research Papersmentioning
confidence: 99%