تقديمات حديثة

  • Cybercrimes and Virtual Worlds: A Systematic Literature Review 

    Matteo, Curcio (جامعة نايف العربية للعلوم الأمنية, 2022-12-05)
    With the evolutions of the gaming industry and the increasing number of virtual worlds (e.g., Metaverse), these applications can be an excellent vector to commit cybercrimes. Since this argument is rarely discussed ...
  • Investigating the Factors Influencing the Use of Cloud Computing 

    Alshahrani, Hussain; Alshahrani, Amnah; Elfaki, Mohamed Ahmed; alshahrani, Saeed; alymani, Mofadal; alkhurayyif, Yazeed (جامعة نايف العربية للعلوم الأمنية, 2022-12-12)
    Cloud computing technology is a new computing paradigm phenomenon that has recently received a signif-icant attention by several research studies. However, the previous works have concentrated on the adoption of this ...
  • The Effect of Applying Information Security Awareness Concept of MOH Employees on Cybersecurity Department – Ministry of Health-Riyadh 

    ALotibi, Mohammed Masaad; Abdullah Alghamdi, Abdulrahman (جامعة نايف العربية للعلوم الأمنية, 2022-10-15)
    The proposed study focuses on the effect of applying the concept of information security awareness of MOH employees on the cybersecurity department at the Ministry of Health in Riyadh. The researcher used the de-scriptive ...
  • Trusted Microservices: A Security Framework for Users' Interaction with Microservices Applications 

    Elkholy, Mohamed Ibrahim; Marzok, Marwa A. (جامعة نايف العربية للعلوم الأمنية, 2022-12-28)
    Microservices architecture emerges as a promising software design approach that provides large scale soft-ware systems with flexibility, scalability and fault tolerance. Moreover, it is considered a suitable design to be ...
  • Cyberthreats Facing High School Students and Methods of Addressing them 

    Alghamdi, Abdulrahman Abdullah (جامعة نايف العربية للعلوم الأمنية, 2022-10-28)
    In this work, we provide an overview of the most common risks and threats related to information technol-ogy faced by high school students in Saudi Arabia. In this context, this work starts from the concept that using ...
  • Pivot Attack Classification for Cyber Threat Intelligence 

    Marques, Rafael Salema; al-Khateeb, Haider; Epiphaniou, Gregory; Maple, Carsten (جامعة نايف العربية للعلوم الأمنية, 2022-10-03)
    The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand ...