SANTILLÁN, ARÉVALO, WONG: A Comprehensive Analysis of Cybersecurity Infrastructure in Academic Environments. 22
[3] V. Vlachos, I. Katsidimas, E. Kerimakis, S. Nikoletseas, S.
Panagiotou, and P. Spirakis, “ASPIDA: A client-oriented
platform for assessing websites security practices adoption
and reward,” in 2021 29th Telecommunications Forum
(TELFOR), Belgrade, Serbia, Nov. 2021, pp. 1–4, doi:
10.1109/TELFOR52709.2021.9653275.
[4] A. Aibekova and V. Selvarajah, “Oensive Security: Study
on Penetration Testing Attacks, Methods, and their Types,”
in 2022 IEEE International Conference on Distributed
Computing and Electrical Circuits and Electronics
(ICDCECE), Ballari, India, Apr. 2022, pp. 1–9, doi:
10.1109/ICDCECE53908.2022.9792772.
[5] M. Liu, Z. Xue, X. Xu, C. Zhong, and J. Chen, “Host-
Based Intrusion Detection System with System Calls,”
ACM Comput Surv, vol. 51, no. 5, pp. 1–36, Sep. 2019, doi:
10.1145/3214304.
[6] G. Vishnuram, K. Tripathi, and A. Kumar Tyagi,
“Ethical Hacking: Importance, Controversies and Scope
in the Future,” in 2022 International Conference on
Computer Communication and Informatics (ICCCI),
Coimbatore, India, Jan. 2022, pp. 01–06, doi: 10.1109/
ICCCI54379.2022.9740860.
[7] M. A. M. Nieto et al., “Web Service to Retrieve and
Semantically Enrich Datasets for Theses From Open
Educational Repositories,” IEEE Access, vol. 8, pp. 171933–
171944, Sep. 2020, doi: 10.1109/ACCESS.2020.3024614.
[8] L. Gallo, D. Gentile, S. Ruggiero, A. Botta, and G. Ventre,
“The human factor in phishing: Collecting and analyzing
user behavior when reading emails,” Comput. Secur., vol.
139, p. 103671, Apr. 2024, doi: 10.1016/j.cose.2023.103671.
[9] Y. Zhang, “Uncovering threats from the surface web
and darknet: A qualitative analysis of content relating to
cybersecurity and critical infrastructure,” M.A. Thesis,
Simon Fraser Univ., Burnaby, BC, Canada, 2022.
[10] S. C. Sethuraman, D. P. V S, T. Reddi, M. S. T. Reddy,
and M. K. Khan, “A comprehensive examination of email
spoong: Issues and prospects for email security,” Comput.
Secur., vol. 137, p. 103600, Feb. 2024, doi: 10.1016/j.
cose.2023.103600.
[11] H. Ahmetoglu and R. Das, “A comprehensive review on
detection of cyber-attacks: Data sets, methods, challenges,
and future research directions,” Internet of Things, vol. 20,
p. 100615, Nov. 2022, doi: 10.1016/j.iot.2022.100615.
[12] A. Jones, “Security Posture: A Systematic Review of Cyber
Threats and Proactive Security,” Senior Honors Thesis,
Liberty Univ., Lynchburg, VA, USA, 2022.
[13] J.P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab,
“Ethical hacking for IoT: Security issues, challenges,
solutions and recommendations,” Internet of Things and
Cyber-Physical Systems, vol. 3, pp. 280–308, 2023, doi:
10.1016/j.iotcps.2023.04.002.
[14] O. Morozova, A. Nicheporuk, A. Tetskyi, and V. Tkachov,
“Methods and technologies for ensuring cybersecurity
of industrial and web-oriented systems and networks,”
Radioelectronic and Computer Systems, no. 4, pp. 145–156,
Nov. 2021, doi: 10.32620/reks.2021.4.12.
[15] M. Walkowski, J. Oko, and S. Sujecki, “Vulnerability
Management Models Using a Common Vulnerability
Scoring System,” Applied Sciences, vol. 11, no. 18, p. 8735,
Sep. 2021, doi: 10.3390/app11188735.
[16] H. Santillán, M. Suárez, and D. Cárdenas, “Desarrollo de
una herramienta IoT para optimizar el control de la humedad
en el cultivo de cacao,” Memoria Investigaciones en
Ingeniería, vol. 25, pp. 246–265, Dec. 2023, doi: 10.36561/
ING.25.14.
[17] Banco Interamericano de Desarrollo and Organización
de Estados Americanos, “Reporte Ciberseguridad 2020:
riesgos, avances y el camino a seguir en América Latina
y el Caribe,” Washington, DC, USA, Jul. 2020, doi:
10.18235/0002513.
[18] J. M. Aguilar Antonio, “La brecha de ciberseguridad en
América Latina frente al contexto global de ciberamenazas,”
Revista de Estudios en Seguridad Internacional, vol. 6, no.
2, pp. 17–43, Dec. 2020, doi: 10.18847/1.12.2.
[19] J. M. Aguilar Antonio, “Retos y oportunidades en materia
de ciberseguridad de América Latina frente al contexto
global de ciberamenazas a la seguridad nacional y política
exterior,” Estudios Internacionales, vol. 53, no. 198, p. 169,
Apr. 2021, doi: 10.5354/0719-3769.2021.57067.
[20] D. R. Denslin Brabin and S. Bojjagani, “A Secure
Mechanism for Prevention of Vishing Attack in Banking
System,” in 2023 International Conference on Networking
and Communications (ICNWC), Chennai, India, Apr. 2023,
pp. 1–5, doi: 10.1109/ICNWC57852.2023.10127561.
[21] N. I. Daud, K. A. Abu Bakar, and M. S. Md Hasan, “A case
study on web application vulnerability scanning tools,” in
2014 Science and Information Conference, London, UK,
Aug. 2014, pp. 595–600, doi: 10.1109/SAI.2014.6918247.
[22] M. Al Ismaili, “Enhancing Cybersecurity: Exploring
Eective Ethical Hacking Techniques with Kali Linux,”
in Research and Applications Towards Mathematics and
Computer Science, vol. 5, E.M. Abo-Dahab Khedary, Ed.
India: B P International, 2023, pp. 135–152, doi: 10.9734/
bpi/ratmcs/v5/5118C.
[23] Y. Alkhurayyif and Y. Saad Almarshdy, “Adopting
Automated Penetration Testing Tools,” Journal of
Information Security and Cybercrimes Research, vol. 7,
no. 1, pp. 51–66, Jun. 2024, doi: 10.26735/RJJT2453.