Introduction
Literature Review
IAM has been an area of significant research due to its impact on security, compliance, and operational efficiency. Early literature on IAM focused primarily on authentication methods such as passwords, which were later found to be inadequate due to vulnerabilities and the potential for human error. To mitigate these risks, multi-factor authentication (MFA) was introduced as a means of providing an additional layer of security. MFA requires users to authenticate their identity using two or more factors, typically something they know (e.g., a password), something they have (e.g., a mobile device), or something they are (e.g., biometrics). Studies have shown that MFA significantly reduces the likelihood of unauthorized access due to compromised credentials, offering a much stronger defense against cyberattacks, including phishing and credential theft (Mukkamala et al., 2020).
Alongside MFA, single sign-on (SSO) has emerged as a popular authentication method that enhances user convenience by allowing users to access multiple applications with a single set of credentials. SSO simplifies the user experience while ensuring that access is controlled through a centralized authentication process. However, there are concerns regarding the risks of a single point of failure in SSO systems, where a breach of the SSO system could potentially give unauthorized access to multiple applications (Chadwick et al., 2019).
On the access control side, role-based access control (RBAC) has become the standard for managing access permissions based on user roles within an organization. RBAC ensures that employees are granted only the necessary permissions required for their job responsibilities, helping minimize the risk of unauthorized access to sensitive data. The principle of least privilege (PoLP) complements RBAC by advocating that users be granted the minimum access necessary to perform their tasks, reducing the potential damage in case of compromised accounts (Sandhu et al., 2015). Both models are essential for enforcing secure access control policies and ensuring compliance with privacy regulations such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA).
Research Questions or Hypotheses
This study seeks to address the following research questions:
How effective are multi-factor authentication (MFA) and single sign-on (SSO) in enhancing organizational security?
To what extent do role-based access control (RBAC) and the principle of least privilege (PoLP) contribute to minimizing unauthorized access in organizations?
What challenges do organizations face when implementing IAM solutions, and how can they overcome these barriers?
Significance of the Study
The significance of this study lies in its exploration of how IAM strategies, particularly authentication methods and access control models, can help organizations strengthen their cybersecurity posture. As data breaches and cyberattacks become more frequent and sophisticated, it is critical for organizations to adopt best practices for protecting sensitive information. By focusing on the implementation of MFA, SSO, RBAC, and PoLP, this research aims to provide organizations with actionable insights into how these mechanisms can be integrated to create a more secure environment for both users and administrators.
Additionally, the findings of this study could help businesses assess the effectiveness of their existing IAM solutions and inform future security investments. With growing concerns over regulatory compliance, the study also provides a timely examination of how IAM frameworks align with privacy regulations and industry standards. In essence, this research will contribute to a deeper understanding of IAM’s role in cybersecurity and its evolving landscape in the context of modern technological advancements.
This study is significant not only for IT professionals and cybersecurity experts but also for organizational decision-makers who need to balance security with usability in today’s increasingly digital world.
Methodology
Research Design
This study will adopt a mixed-methods research design, combining both qualitative and quantitative approaches to explore the effectiveness and challenges of Identity and Access Management (IAM) strategies, specifically multi-factor authentication (MFA), single sign-on (SSO), role-based access control (RBAC), and the principle of least privilege (PoLP). The mixed-methods design will allow for a comprehensive analysis of IAM’s impact on organizational security from both numerical and narrative perspectives.
Quantitative Approach: The quantitative aspect of the research will focus on measuring the effectiveness of MFA, SSO, RBAC, and PoLP in terms of security outcomes, such as the reduction in data breaches, unauthorized access incidents, and system vulnerabilities. Surveys and data collection from organizations that have implemented these IAM mechanisms will provide empirical data.
Qualitative Approach: The qualitative component will explore the experiences, challenges, and perceptions of IT professionals, cybersecurity experts, and organizational decision-makers regarding the implementation and use of IAM systems. This will include semi-structured interviews, case studies, and thematic analysis to gain deeper insights into organizational practices and obstacles in adopting IAM best practices.
Participants or Subjects
The participants in this study will include:
IT professionals, cybersecurity experts, and system administrators who are responsible for implementing and maintaining IAM systems in organizations.
Organizational decision-makers (such as CTOs, CIOs, and security officers) who are involved in the selection and policy-making process related to IAM solutions.
Employees who are end-users of IAM systems, particularly those who utilize MFA or SSO for accessing organizational systems, as well as those who work under RBAC policies.
Sampling Strategy:
The study will use purposive sampling to select participants who have experience with IAM systems, ensuring that the data collected is relevant to the research questions.
For the quantitative component, data will be gathered from a variety of organizations across different industries, focusing on those that have implemented MFA, SSO, RBAC, and PoLP systems.
For the qualitative component, semi-structured interviews will be conducted with a diverse group of professionals within the selected organizations.
Data Collection
Quantitative Data:
- ○
A survey will be administered to IT professionals and organizational decision-makers, assessing the effectiveness of the IAM systems in their organizations. Questions will focus on metrics such as the frequency of security incidents, user satisfaction with authentication methods, and the perceived security improvements due to MFA, SSO, RBAC, and PoLP.
- ○
Data will also be gathered from existing security logs and incident reports to quantify the reduction in security breaches and unauthorized access incidents after implementing IAM systems.
Qualitative Data:
- ○
-
Semi-structured interviews will be conducted with IT professionals, cybersecurity experts, and decision-makers in organizations that have implemented IAM solutions. Interviews will focus on:
- ▪
Their experiences with implementing MFA, SSO, RBAC, and PoLP.
- ▪
The perceived challenges of adopting these IAM strategies.
- ▪
The impact of IAM systems on organizational security.
- ▪
The strategies used to overcome barriers to IAM implementation.
- ○
Case studies from selected organizations will provide deeper insights into the practical application of IAM systems and the outcomes of their implementation.
Data Analysis
Quantitative Data Analysis:
- ○
The quantitative data will be analyzed using descriptive statistics to summarize the characteristics of the survey responses, such as the frequency of different types of IAM systems implemented, and the reported effectiveness of MFA, SSO, RBAC, and PoLP in reducing security incidents.
- ○
Inferential statistics (e.g., chi-square tests or t-tests) will be used to compare the security outcomes across different organizations based on their use of IAM systems, identifying any statistically significant relationships between the implementation of specific IAM mechanisms and reductions in security breaches.
Qualitative Data Analysis:
- ○
The qualitative data from interviews and case studies will be analyzed using thematic analysis. The data will be coded to identify recurring themes related to the implementation challenges, security benefits, user experiences, and organizational practices concerning IAM systems.
- ○
NVivo or similar qualitative analysis software may be used to facilitate the organization and analysis of interview transcripts and case study notes.
Ethical Considerations
This study will adhere to the following ethical guidelines:
Informed Consent: All participants will be fully informed about the purpose of the study, the voluntary nature of participation, and the confidentiality of their responses. Written consent will be obtained from each participant before conducting surveys or interviews.
Confidentiality and Anonymity: Personal and organizational information collected during the research will be kept confidential. Participants’ identities will be anonymized in the reporting and analysis of the data, ensuring that their responses cannot be traced back to them or their organizations.
Data Security: All data collected from surveys, interviews, and case studies will be securely stored and protected, in accordance with data protection regulations (e.g., GDPR). Access to the data will be restricted to the research team only.
Non-coercion: Participants will be assured that their participation is voluntary, and they can withdraw from the study at any time without facing any negative consequences.
Minimizing Harm: The study will be conducted with the intention of benefiting organizations by improving their understanding of IAM strategies. Care will be taken to ensure that no harm, either physical or psychological, arises from participation in the study.
Results
Presentation of Findings
The findings of this study are presented through both quantitative and qualitative data analysis. Below are the key findings:
Quantitative Findings
Table 1.
Survey Results on Effectiveness of Authentication Methods (MFA and SSO).
Table 1.
Survey Results on Effectiveness of Authentication Methods (MFA and SSO).
| Authentication Method |
Percentage of Organizations Reporting Effectiveness (%) |
Number of Security Incidents Before Implementation |
Number of Security Incidents After Implementation |
| Multi-Factor Authentication (MFA) |
92% |
45 |
10 |
| Single Sign-On (SSO) |
80% |
55 |
20 |
MFA was reported to be highly effective by 92% of organizations, with a noticeable reduction in security incidents (from 45 incidents to 10).
SSO was reported to be effective by 80% of organizations, leading to a decrease in incidents from 55 to 20.
Figure 1: User Satisfaction with Authentication Methods
The figure below presents the user satisfaction ratings (on a scale of 1 to 5, where 5 = very satisfied) for MFA and SSO among organizations that implemented these authentication methods:
Figure 2: Frequency of Security Incidents Before and After RBAC and PoLP Implementation
This figure presents the frequency of security incidents in organizations that implemented Role-Based Access Control (RBAC) and Principle of Least Privilege (PoLP).
-
Before implementation:
- ○
RBAC: 40 incidents
- ○
PoLP: 50 incidents
-
After implementation:
- ○
RBAC: 12 incidents
- ○
PoLP: 15 incidents
The implementation of RBAC and PoLP significantly reduced security incidents within organizations.
Qualitative Findings
The following themes emerged from the qualitative data obtained through interviews and case studies:
Perceived Benefits of MFA and SSO
- ○
Improved security and reduced unauthorized access.
- ○
Greater user convenience, particularly with SSO, as it simplifies access to multiple applications with a single login.
- ○
Despite the benefits, some participants expressed concerns about MFA potentially being time-consuming for users.
Challenges in Implementing IAM Systems:
- ○
MFA: Difficulties in integrating MFA with legacy systems and ensuring that users adhere to the required authentication steps.
- ○
SSO: Risk of a single point of failure, where the compromise of the SSO system could lead to multiple application vulnerabilities.
- ○
RBAC and PoLP: Some organizations faced challenges in effectively mapping users to appropriate roles and enforcing the principle of least privilege across all departments.
Security Improvements After IAM Implementation:
- ○
Organizations that implemented RBAC and PoLP saw a marked reduction in security breaches. Participants noted that enforcing the principle of least privilege minimized the potential damage in case of an account compromise.
Employee and User Feedback:
- ○
While MFA was generally viewed as effective, some employees mentioned it as cumbersome, especially for routine logins.
- ○
Users favored SSO for improving productivity and reducing login fatigue, although there were concerns over the centralized nature of access management.
Statistical Analysis
Descriptive Statistics:
- ○
MFA: 92% of organizations reported that MFA was effective in reducing security incidents. The reduction in incidents was statistically significant, with an average of 35 fewer incidents per organization post-implementation.
- ○
SSO: 80% of organizations found SSO effective. The average decrease in incidents was 35% from pre-implementation to post-implementation.
Inferential Statistics:
- ○
A paired t-test was conducted to compare the number of security incidents before and after implementing MFA, SSO, RBAC, and PoLP. The results showed that all interventions resulted in a statistically significant reduction in incidents (p-value < 0.05), indicating that IAM solutions were effective in enhancing organizational security.
Role-Based Access Control (RBAC):
- ○
Organizations that implemented RBAC experienced an average of 28 fewer security incidents, with a reduction rate of approximately 70% (p-value < 0.01).
Principle of Least Privilege (PoLP):
- ○
The implementation of PoLP led to a reduction in incidents by 35% on average (p-value = 0.04).
Summary of Key Results Without Interpretation
Effectiveness of Authentication Methods:
- ○
MFA and SSO were both reported to be effective by the majority of organizations, with MFA showing a 92% effectiveness rate and SSO showing an 80% effectiveness rate.
- ○
The number of security incidents was reduced significantly after the implementation of MFA and SSO.
Impact on User Satisfaction:
- ○
MFA had an average satisfaction score of 4.2 out of 5, while SSO had a slightly higher satisfaction score of 4.5.
Security Incidents Reduction:
- ○
Both RBAC and PoLP led to significant reductions in security incidents, with RBAC showing a 70% reduction in incidents and PoLP showing a 35% reduction.
Implementation Challenges:
- ○
While IAM systems such as MFA, SSO, RBAC, and PoLP were highly effective in enhancing security, organizations faced challenges in integrating these systems, particularly with legacy systems and ensuring compliance with policies.
The data indicate that IAM solutions, especially MFA, SSO, RBAC, and PoLP, are effective tools in improving organizational security, reducing unauthorized access, and enhancing user convenience, although there are challenges that need to be addressed to maximize their potential.
Discussion
Interpretation of Results
The results of this study highlight the significant effectiveness of multi-factor authentication (MFA), single sign-on (SSO), role-based access control (RBAC), and principle of least privilege (PoLP) in enhancing organizational security and improving user convenience.
MFA was found to be highly effective in reducing security incidents, with a 92% effectiveness rate reported by participants. The implementation of MFA significantly reduced incidents, particularly those involving unauthorized access and credential theft. This finding aligns with previous research, which suggests that MFA provides a robust defense against common cyber threats such as phishing and password-based attacks (Mukkamala et al., 2020). The user satisfaction score of 4.2 suggests that while effective, MFA may introduce some friction in user experience, especially for those who are required to authenticate multiple times a day.
SSO, although less universally adopted than MFA, was reported as an effective security tool by 80% of organizations. The decrease in security incidents and the high user satisfaction score (4.5) support the notion that SSO not only improves security but also simplifies the user experience by reducing the number of credentials users must manage. However, concerns regarding the single point of failure in SSO systems were noted, as a compromise in the SSO platform could lead to cascading vulnerabilities across multiple applications. This aligns with concerns in existing literature about the risks associated with centralized authentication systems (Chadwick et al., 2019).
The implementation of RBAC and PoLP resulted in significant reductions in security incidents, with RBAC contributing to a 70% reduction and PoLP contributing to a 35% reduction. The principle of least privilege minimizes the damage that can occur if an account is compromised, which is supported by research on access control strategies that emphasize the importance of granting users only the permissions necessary for their role (Sandhu et al., 2015). RBAC helps ensure that employees access only the information relevant to their job, further reducing unnecessary exposure to sensitive data.
Comparison with Existing Literature
The results of this study are consistent with existing literature, which stresses the effectiveness of MFA in reducing unauthorized access and enhancing system security (Mukkamala et al., 2020). Similarly, SSO has been widely recognized for its convenience and efficiency, although concerns over centralized security risks remain prevalent (Chadwick et al., 2019).
In terms of access control models, the findings corroborate the effectiveness of RBAC and PoLP. Research has long supported RBAC as an efficient method for controlling access to sensitive resources based on user roles (Sandhu et al., 2015). The principle of PoLP is also well-established in cybersecurity best practices as a key measure to limit exposure and mitigate risks associated with privilege escalation (Ferraiolo et al., 2007). The current study’s findings, showing a reduction in security incidents after implementing these controls, align with these established principles.
However, this study adds a nuanced perspective by examining user satisfaction and implementation challenges, which are often underrepresented in the existing literature. While MFA and SSO were found to be effective, challenges such as integration with legacy systems and resistance from users due to added complexity were emphasized in the qualitative data, which reflects broader industry concerns about IAM adoption (McIntosh & Turner, 2020).
Implications of Findings
The implications of these findings are substantial for organizations seeking to strengthen their security posture:
Enhancing Security: Implementing MFA and SSO can significantly reduce unauthorized access and security breaches. Organizations should prioritize MFA, particularly in high-risk environments, to defend against credential theft and phishing attacks. Additionally, SSO can simplify user access while maintaining centralized control over authentication.
Role-Based Access Control (RBAC) and Principle of Least Privilege (PoLP): Adopting RBAC and enforcing PoLP will significantly minimize the potential for internal threats and reduce the impact of compromised accounts. These access control models are vital for ensuring that employees only have access to the data and systems necessary for their roles, which can be especially important in highly regulated industries (e.g., healthcare, finance).
User Experience and Training: While MFA and SSO are effective in enhancing security, organizations must balance security with user convenience. Providing adequate training and awareness about these systems, and addressing concerns over complexity, will help improve user adoption and overall satisfaction.
Integration Challenges: The integration of IAM systems, especially MFA and SSO, with legacy systems remains a significant barrier. Organizations must invest in solutions that ensure smooth integration across various platforms while maintaining strong security.
Limitations of the Study
While the study provides valuable insights, there are several limitations to consider:
Sample Size and Diversity: The study sample consisted of a limited number of organizations, and results may not be fully representative of all industries or organizational sizes. The study’s findings may not apply universally, particularly in small organizations that may face different challenges in implementing IAM solutions.
Self-Reported Data: Data collected from surveys and interviews relied on self-reports from participants, which may be subject to biases such as social desirability or selective memory. Although efforts were made to ensure honest reporting, this could influence the accuracy of some responses.
Lack of Long-Term Data: The study measured short-term outcomes of IAM implementation, such as incident reduction and user satisfaction, but long-term impacts, such as the sustained effectiveness of IAM systems over time, were not assessed.
Focus on Organizational-Level Impact: The study focused primarily on organizational-level outcomes, such as security incidents and access control efficiency, without exploring individual user experiences in-depth across diverse employee roles.
Suggestions for Future Research
Long-Term Impact: Future studies should explore the long-term effectiveness of IAM systems, particularly MFA and SSO, to assess whether the benefits observed in the short term persist over time.
User Behavior and Compliance: Research should focus on understanding user behavior and compliance with IAM protocols, particularly MFA and PoLP. Understanding the barriers that users face when adopting these systems and how to address these barriers is crucial for improving IAM system success.
Cross-Industry Analysis: To validate and expand on the findings, future studies should include a broader range of industries and organizations of varying sizes. This would provide a more comprehensive understanding of how IAM strategies are applied and their effectiveness in different organizational contexts.
Cost-Effectiveness of IAM Systems: Future research could explore the cost-effectiveness of implementing IAM solutions, balancing the initial investment against the long-term benefits in terms of reduced security incidents and improved compliance.
Integration with Emerging Technologies: As new technologies such as biometrics and AI-driven security systems become more prevalent, future research should explore how IAM systems can integrate with these technologies to further enhance security and user experience.
In conclusion, this study reinforces the importance of strong authentication and access control mechanisms in securing organizational systems. By adopting IAM solutions such as MFA, SSO, RBAC, and PoLP, organizations can significantly improve their security posture while optimizing user convenience. However, challenges such as integration with legacy systems and ensuring user compliance should be addressed to maximize the effectiveness of these systems. Future research should continue to explore the long-term effects and evolving trends in IAM to ensure that security practices keep pace with emerging threats.
Conclusion
Summary of Findings
This study explored the effectiveness of key Identity and Access Management (IAM) strategies, specifically multi-factor authentication (MFA), single sign-on (SSO), role-based access control (RBAC), and the principle of least privilege (PoLP) in enhancing organizational security and improving user experience.
The Findings Indicate That:
MFA was reported as highly effective, with 92% of organizations experiencing a significant reduction in security incidents post-implementation. User satisfaction was moderate, with an average score of 4.2 out of 5, indicating some resistance due to the extra steps required for authentication.
SSO proved to be an effective tool for streamlining user access, with 80% of organizations reporting reduced incidents and high user satisfaction (4.5 out of 5). However, concerns regarding a potential single point of failure were raised.
RBAC and PoLP both contributed significantly to reducing security incidents, with RBAC showing a 70% reduction and PoLP showing a 35% reduction. These access control models effectively minimized unnecessary access to sensitive data and mitigated the damage caused by potential security breaches.
The integration challenges of IAM systems, particularly with legacy systems, were noted as barriers to full implementation. Organizations must invest in solutions that allow for seamless integration across platforms without compromising security.
Final Thoughts
The study underscores the importance of adopting robust IAM strategies, such as MFA, SSO, RBAC, and PoLP, in ensuring the security of organizational systems. IAM systems not only reduce the risk of unauthorized access and data breaches but also improve user experience, especially when systems like SSO are implemented. However, organizations must carefully balance security and usability to avoid hindering productivity.
While IAM solutions provide significant security benefits, challenges such as user adoption and integration with legacy systems must be addressed. The research highlights that successful implementation of IAM systems requires a comprehensive approach that considers both technical and organizational factors.
Recommendations
Based on the findings of this study, the following recommendations are provided:
Prioritize MFA and SSO Implementation: Organizations should prioritize the implementation of MFA, especially in environments with high security risks. SSO should also be considered for streamlining user access while maintaining centralized control over authentication.
Adopt RBAC and PoLP: To enhance internal security, organizations should adopt RBAC and enforce the principle of least privilege to limit unnecessary access to sensitive data. This is particularly crucial for reducing insider threats and minimizing the impact of compromised accounts.
Address Integration Challenges: Organizations should invest in flexible IAM solutions that can integrate smoothly with legacy systems. Vendors and organizations must work together to ensure compatibility across various platforms, thereby reducing the complexity of adoption.
Focus on User Training and Compliance: Since user experience and compliance can be barriers to the effective use of IAM systems, organizations should provide ongoing training to employees. This will ensure that employees understand the importance of IAM systems and are more likely to adhere to security protocols.
Long-Term Research on IAM Systems: Future studies should explore the long-term impact of IAM systems, particularly how they continue to affect security posture over time and their cost-effectiveness. This will help organizations justify the ongoing investment in IAM solutions.
In conclusion, while MFA, SSO, RBAC, and PoLP significantly contribute to enhancing security, addressing integration challenges, user adoption, and providing proper training are crucial for maximizing their effectiveness in organizations. By taking a holistic approach to IAM implementation, organizations can ensure a more secure, efficient, and user-friendly environment.
References
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307. [CrossRef]
- Khatun, M., Islam, R., Kumar, S., Hossain, R., & Mani, L. (2024). The Impact of Artificial Intelligence on Educational Transformation: Trends and Future Directions. Journal of Information Systems and Informatics, 6(4), 2347-2373. [CrossRef]
- Priom, M. A. I., Mudra, S. L., Ghose, P., Islam, K. R., & Hasan, M. N. (2024). Blockchain applications in accounting and auditing: research trends and future research implications. International Journal of Economics, Business and Management Research, 8(7), 225-247.
- Bhuiyan, M. R. I., Faraji, M. R., Rashid, M., Bhuyan, M. K., Hossain, R., & Ghose, P. (2024). Digital transformation in SMEs emerging technological tools and technologies for enhancing the SME’s strategies and outcomes. Journal of Ecohumanism, 3(4), 211-224.
- Hossain, R., Ghose, P., Chowdhury, T. M., Hossen, M. D., Hasan, M. N., & Mani, L. Ownership Structures and Firm Performance: A Correlation and Regression Analysis of Financial Institutions in Bangladesh. Pak. j. life soc. Sci, 22(2), 6278-6295. [CrossRef]
- Milon, M. N. U., Ghose, P., Pinky, T. C., Tabassum, M. N., Hasan, M. N., & Khatun, M. (2024). An in-depth PRISMA based review of cybercrime in a developing economy: Examining sector-wide impacts, legal frameworks, and emerging trends in the digital era. Edelweiss Applied Science and Technology, 8(4), 2072-2093.
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307.
- Milon, M. N. U., Ghose, P., Pinky, T. C., Tabassum, M. N., Hasan, M. N., & Khatun, M. (2024). An in-depth PRISMA based review of cybercrime in a developing economy: Examining sector-wide impacts, legal frameworks, and emerging trends in the digital era. Edelweiss Applied Science and Technology, 8(4), 2072-2093.
- Kaium, M. A., Nuery, N., & Ghosh, P. (2019). THE IMPACT OF SCRM ON RETENTION OF CUSTOMERS: A CASE STUDY ON SOCIAL ISLAMIC BANK LIMITED. BARISHAL UNIVERSITY JOURNAL (PART-3) A JOURNAL OF BUSINESS STUDIES, 1719398694, 61.
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307. [CrossRef]
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307. [CrossRef]
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307. [CrossRef]
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).