Iqra Naseer

Iqra Naseer
  • Cognizant Technology Solutions

About

7
Publications
5,672
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
80
Citations
Current institution

Publications

Publications (7)
Article
Contemporary institutions are consistently confronted with fraudulent activities that exploit weaknesses in interconnected systems. Securing critical data against unauthorized access by hackers and other cybercriminals requires the application of robust cybersecurity protocols. As the number and complexity of cyber threats continue to grow, innovat...
Article
Full-text available
The CrowdStrike incident is also helpful in evaluating the understanding of who is defending from cyber-attacks and what methods are being used. This pen works on the deep understanding of how this attack was performed, how the adversary detailed it step by step, what TTPs were used, and what an APT is at all. Deconstructing the CrowdStrike inciden...
Article
Full-text available
Cyber and phishing assaults are becoming more common and complex, and artificial intelligence (AI) has become an essential tool for detecting and blocking them. This study delves into the ways AI-driven solutions might improve cybersecurity by spotting possible threats in real-time using machine learning techniques, natural language processing, and...
Article
Full-text available
Distributed Denial of Service (DDoS) attacks pose a severe threat to network infrastructures, causing downtime and significant financial losses. Machine learning (ML) algorithms have emerged as a promising approach for predicting and mitigating these attacks. This abstract explores the application of ML in tackling DDoS attacks, focusing on predict...
Article
This study delves into the optimization strategies of Amazon Web Services (AWS) cloud computing solutions tailored specifically for businesses. It provides an in-depth exploration of the transformative impact that cloud computing has had on modern business operations, emphasizing the pivotal role played by AWS in delivering scalable, flexible, and...
Article
Full-text available
In the context of the relentless increase in the velocities and complexities of cyberattacks, malware remains one of the major cybersecurity threats that organizations, individuals, and governments are facing. Traditional signature-based detection systems can't keep up with evolving zero-day threats. The focus of malware detection in this study is...
Article
Full-text available
The increasing development of cyber threats has urged the establishment of efficient Intrusion Detection Systems that can predict and mitigate these attacks. With the ability to predict future threats and implement mechanisms, machine learning techniques offer excellent solutions in making IDS more intelligent, autonomous, and adaptive for future t...