World Scientific News
EISSN 2392-2192
  • Login
  • Home
  • About
    • About Us
    • Editorial Board
    • Guide for Authors
    • Abstracting & Indexing
    • Instruction for Authors
    • Submit your Article
  • View Articles
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
  • Careers
  • News
No Result
View All Result
SUBMIT ARTICLE
Register
  • Home
  • About
    • About Us
    • Editorial Board
    • Guide for Authors
    • Abstracting & Indexing
    • Instruction for Authors
    • Submit your Article
  • View Articles
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
  • Careers
  • News
No Result
View All Result
World Scientific News
No Result
View All Result
Home 2024

Simulating Cyber Threats: A Review of AI-powered Attack Simulators for Enhanced Cybersecurity

Authors: Md Abu Imran Mallick, and Rishab Nath, WSN 197 (2024) 13-54

2024-09-23
Reading Time: 14 mins read
0

ABSTRACT

The cybersecurity landscape is undergoing a significant transformation, driven by the escalating sophistication and prevalence of cyber threats. Traditional defensive measures, focused on detection and prevention, are no longer sufficient to combat these evolving threats. To address this challenge, a more comprehensive strategy is required, incorporating advanced cybersecurity measures such as artificial intelligence (AI)-powered attack modelling and simulation tools. This review paper presents a thorough examination of existing attack simulators, analysing their capabilities, limitations, and applications in AI-driven cybersecurity. Our systematic review of 25 attack simulators reveals a predominant focus on network-based attacks, with limited coverage of endpoint, cloud, or IoT attacks. AI-powered simulators demonstrate enhanced accuracy and efficiency in predicting attack vectors and identifying vulnerabilities. However, current simulators lack realistic user behaviour modelling, hindering the accuracy of attack simulations. Furthermore, integration with existing security tools and frameworks is crucial for effective attack simulation and remediation.Our review highlights the need for holistic attack simulators addressing diverse attack types and vectors, enhanced AI-powered simulation capabilities for improved accuracy and efficiency, realistic user behaviour modelling to simulate real-world attack scenarios, and standardized evaluation metrics for attack simulators to ensure comparability and effectiveness. This review serves as a foundation for future research in AI-powered attack modelling and simulation, providing valuable insights for cybersecurity professionals seeking to enhance their defences against evolving cyber threats, researchers exploring innovative approaches to cybersecurity, and organizations aiming to bolster their cybersecurity posture.

References

[1] Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65-88.

[2] Abrahams, T. O., Ewuga, S. K., Dawodu, S. O., Adegbite, A. O., & Hassan, A. O. (2024). A review of cybersecurity strategies in modern organizations: examining the evolution and effectiveness of cybersecurity measures for data protection. Computer Science & IT Research Journal, 5(1), 1-25.

[3] Adelaiye, O. I., Showole, A., & Faki, S. A. (2018). Evaluating advanced persistent threats mitigation effects: a review. International Journal of Information Security Science, 7(4), 159-171.

[4] Afreen, A., Aslam, M., & Ahmed, S. (2020, October). Analysis of fileless malware and its evasive behavior. In 2020 International Conference on Cyber Warfare and Security (ICCWS) (pp. 1-8). IEEE.

ADVERTISEMENT

[5] Aggarwal, R., Mytton, O. T., Derbrew, M., Hananel, D., Heydenburg, M., Issenberg, B., … & Reznick, R. (2010). Training and simulation for patient safety. BMJ Quality & Safety, 19(Suppl 2), i34-i43.

[6] Agrafiotis, I., Nurse, J. R., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1), tyy006.

[7] Agrawal, N., & Tapaswi, S. (2019). Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 21(4), 3769-3795.

[8] Ahmad, A., Maynard, S. B., & Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 25, 357-370.

[9] Ahmad, A., Maynard, S. B., Desouza, K. C., Kotsias, J., Whitty, M. T., & Baskerville, R. L. (2021). How can organizations develop situation awareness for incident response: A case study of management practice. Computers & Security, 101, 102122.

[10] Aïmeur, E., & Schőnfeld, D. (2011, July). The ultimate invasion of privacy: Identity theft. In 2011 Ninth Annual International Conference on Privacy, Security and Trust (pp. 24-31). IEEE.

[11] Ajala, O. A., Okoye, C. C., Ofodile, O. C., Arinze, C. A., & Daraojimba, O. D. (2024). Review of AI and machine learning applications to predict and Thwart cyber-attacks in real-time. Magna Scientia Advanced Research and Reviews, 10(1), 312-320.

[12] Ajmal, A. B., Shah, M. A., Maple, C., Asghar, M. N., & Islam, S. U. (2021). Offensive security: Towards proactive threat hunting via adversary emulation. IEEE Access, 9, 126023-126033.

[13] Alabady, S. A., Al-Turjman, F., & Din, S. (2020). A novel security model for cooperative virtual networks in the IoT era. International Journal of Parallel Programming, 48(2), 280-295.

[14] AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754.

[15] Alizadeh, R., Lund, P. D., Beynaghi, A., Abolghasemi, M., & Maknoon, R. (2016). An integrated scenario-based robust planning approach for foresight and strategic management with application to energy industry. Technological Forecasting and Social Change, 104, 162-171.

[16] Aljohani, A. (2023). Predictive analytics and machine learning for real-time supply chain risk mitigation and agility. Sustainability, 15(20), 15088.

[17] Alshamrani, A., Myneni, S., Chowdhary, A., & Huang, D. (2019). A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities. IEEE Communications Surveys & Tutorials, 21(2), 1851-1877.

[18] Althobaiti, K., Jenkins, A. D., & Vaniea, K. (2021). A case study of phishing incident response in an educational organization. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW2), 1-32.

[19] Ande, R., Adebisi, B., Hammoudeh, M., & Saleem, J. (2020). Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society, 54, 101728.

[20] Ani, U. D., He, H., & Tiwari, A. (2019). Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology, 21(1), 2-35.

[21] Anisetti, M., Ardagna, C., Cremonini, M., Damiani, E., Sessa, J., & Costa, L. (2020). Security threat landscape. White Paper Security Threats.

[22] Apruzzese, G., Andreolini, M., Ferretti, L., Marchetti, M., & Colajanni, M. (2022). Modeling realistic adversarial attacks against network intrusion detection systems. Digital Threats: Research and Practice (DTRAP), 3(3), 1-19.

[23] Armenia, S., Angelini, M., Nonino, F., Palombi, G., & Schlitzer, M. F. (2021). A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs. Decision Support Systems, 147, 113580.

[24] Asghar, M. R., Hu, Q., & Zeadally, S. (2019). Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks, 165, 106946.

[25] Ashtiani, M., & Abdollahi Azgomi, M. (2014). A distributed simulation framework for modeling cyber attacks and the evaluation of security measures. Simulation, 90(9), 1071-1102.

[26] Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.

[27] Baccelli, E. (2021). Internet of Things (IoT): Societal Challenges & Scientific Research Fields for IoT.

[28] Bahrami, P. N., Dehghantanha, A., Dargahi, T., Parizi, R. M., Choo, K. K. R., & Javadi, H. H. (2019). Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures. Journal of information processing systems, 15(4), 865-889.

[29] Bajaj, S., Breslau, L., Estrin, D., Fall, K., Floyd, S., Haldar, P., … & Zappala, D. (1999). Improving simulation for network research. Technical Report 99-702b, University of Southern California.

[30] Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artificial Intelligence Review, 54(5), 3849-3886.

[31] Behal, S., & Kumar, K. (2017). Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. Int. J. Netw. Secur., 19(3), 383-393.

[32] Bellardo, J., & Savage, S. (2003). 802.11 {Denial-of-Service} attacks: Real vulnerabilities and practical solutions. In 12th USENIX security symposium (USENIX Security 03).

[33] Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems, 28(5), 755-768.


Download all article in PDF

WSN 197 (2024) 13-54


 

Tags: Artificial Intelligencecyber threat intelligencecybersecurityincident response.proactive defencesimulation toolsthreat modellingvulnerability assessment
ShareTweetPin
Next Post

Effects of Building Material Costs on Housing Development in Nigeria

Statistical Analysis and Characterisation of Geomagnetic Storm Occurrence and its Dependent on Solar Cycle, Season, and Time during Solar Cycles 21 – 24

View free articles

  • Open access

View Articles

  • 2013 (5)
    • Volume 1 (2013), pp. 1-14 (2)
    • Volume 2 (2013), pp. 1-29 (3)
  • 2014 (13)
    • Volume 3 (2014), pp. 1-21 (3)
    • Volume 4 (2014), pp. 1-16 (2)
    • Volume 5 (2014), pp. 1-36 (4)
    • Volume 6 (2014), pp. 1-23 (3)
  • 2015 (109)
    • Volume 10 (2015), pp. 1-100 (5)
    • Volume 11 (2015), pp. 1-96 (6)
    • Volume 12 (2015), pp. 1-76 (6)
    • Volume 13 (2015), pp. 1-130 (7)
    • Volume 14 (2015), pp. 1-55 (1)
    • Volume 15 (2015), pp. 1-25 (2)
    • Volume 16 (2015), pp. 1-158 (9)
    • Volume 17 (2015), pp. 1-63 (1)
    • Volume 18 (2015), pp. 1-127 (8)
    • Volume 19 (2015), pp. 1-111 (7)
    • Volume 20 (2015), pp. 1-336 (1)
    • Volume 21 (2015), pp. 1-89 (7)
    • Volume 22 (2015), pp. 1-119 (8)
    • Volume 23 (2015), pp. 1-127 (10)
    • Volume 24 (2015), pp. 1-87 (6)
    • Volume 7 (2015), pp. 1-237 (9)
    • Volume 8 (2015), pp. 1-203 (7)
    • Volume 9 (2015), pp. 1-160 (9)
  • 2016 (517)
    • Volume 25 (2016), pp. 1-16 (2)
    • Volume 26 (2016), pp. 1-19 (2)
    • Volume 27 (2016), pp. 1-16 (2)
    • Volume 28 (2016), pp. 1-100 (7)
    • Volume 29 (2016), pp. 1-95 (6)
    • Volume 30 (2016), pp. 1-142 (10)
    • Volume 31 (2016), pp. 1-124 (8)
    • Volume 32 (2016), pp. 1-81 (9)
    • Volume 33 (2016), pp. 1-121 (8)
    • Volume 34 (2016), pp. 1-145 (10)
    • Volume 35 (2016), pp. 1-133 (10)
    • Volume 36 (2016), pp. 1-152 (10)
    • Volume 37 (2016), pp. 1-303 (18)
    • Volume 38 (2016), pp. 1-59 (1)
    • Volume 39 (2016), pp. 1-30 (2)
    • Volume 40 (2016), pp. 1-299 (20)
    • Volume 41 (2016), pp. 1-287 (36)
    • Volume 42 (2016), pp. 1-316 (21)
    • Volume 43(1,2,3) (2016), pp. 1-157 (3)
      • Volume 43, Issue 1 (2016), pp. 1-55 (1)
      • Volume 43, Issue 2 (2016), pp. 56-103 (1)
      • Volume 43, Issue 3 (2016), pp. 104-157 (1)
    • Volume 44 (2016), pp. 1-301 (20)
    • Volume 45(1,2) (2016), pp. 1-383 (21)
      • Volume 45, Issue 1 (2016), pp. 1-62 (1)
      • Volume 45, Issue 2 (2016), pp. 63-383 (20)
    • Volume 46 (2016), pp. 1-286 (20)
    • Volume 47(1,2) (2016), pp. 1-350 (21)
      • Volume 47, Issue 1 (2016), pp. 1-61 (1)
      • Volume 47, Issue 2 (2016), pp. 62-350 (20)
    • Volume 48 (2016), pp. 1-163 (17)
    • Volume 49(1,2) (2016), pp. 1-404 (21)
      • Volume 49, Issue 1 (2016), pp. 1-58 (1)
      • Volume 49, Issue 2 (2016), pp. 59-404 (20)
    • Volume 50 (2016), pp. 1-316 (20)
    • Volume 51 (2016), pp. 1-71 (7)
    • Volume 52 (2016), pp. 1-275 (20)
    • Volume 53(1,2,3) (2016), pp. 1-429 (22)
      • Volume 53, Issue 1 (2016), pp. 1-66 (1)
      • Volume 53, Issue 2 (2016), pp. 67-109 (1)
      • Volume 53, Issue 3 (2016), pp. 110-429 (20)
    • Volume 54 (2016), pp. 1-299 (20)
    • Volume 55 (2016), pp. 1-288 (20)
    • Volume 56 (2015), pp. 1-266 (20)
    • Volume 57 (2016), pp. 1-570 (53)
    • Volume 58 (2016), pp. 1-161 (10)
    • Volume 59 (2016), pp. 1-128 (10)
    • Volume 60 (2016), pp. 1-120 (10)
  • 2017 (481)
    • Volume 61(1,2) (2017), pp. 1-194 (11)
      • Volume 61, Issue 1 (2017), pp. 1-51 (1)
      • Volume 61, Issue 2 (2017), pp. 52-194 (10)
    • Volume 62 (2017), pp. 1-146 (10)
    • Volume 63 (2017), pp. 1-240 (1)
    • Volume 64 (2017), pp. 1-140 (10)
    • Volume 65 (2017), pp. 1-175 (10)
    • Volume 66 (2017), pp. 1-300 (20)
    • Volume 67(1,2,) (2017), pp. 1-389 (21)
      • Volume 67, Issue 1 (2017), pp. 1-67 (1)
      • Volume 67, Issue 2 (2017), pp. 68-389 (20)
    • Volume 68 (2017), pp. 1-141 (1)
    • Volume 69 (2017), pp. 1-253 (20)
    • Volume 70(1,2) (2017), pp. 1-321 (21)
      • Volume 70, Issue 1 (2017), pp. 1-50 (1)
      • Volume 70, Issue 2 (2017), pp. 51-321 (20)
    • Volume 71 (2017), pp. 1-219 (18)
    • Volume 72 (2017), pp. 1-478 (46)
    • Volume 73 (2017), pp. 1-133 (15)
    • Volume 74 (2017), pp. 1-287 (20)
    • Volume 75 (2017), pp. 1-111 (12)
    • Volume 76 (2017), pp. 1-199 (20)
    • Volume 77(1,2) (2017), pp. 1-380 (21)
      • Volume 77, Issue 1 (2017), pp. 1-102 (1)
      • Volume 77, Issue 2 (2017), pp. 103-380 (20)
    • Volume 78 (2017), pp. 1-230 (24)
    • Volume 79 (2017), pp. 1-89 (1)
    • Volume 80 (2017), pp. 1-323 (20)
    • Volume 81(1,2) (2017), pp. 1-312 (21)
      • Volume 81, Issue 1 (2017), pp. 1-47 (1)
      • Volume 81, Issue 2 (2017), pp. 48-312 (20)
    • Volume 82 (2017), pp. 1-90 (1)
    • Volume 83 (2017), pp. 1-239 (20)
    • Volume 84 (2017), pp. 1-92 (1)
    • Volume 85 (2017), pp. 1-73 (10)
    • Volume 86(1,2,3) (2017), pp. 1-370 (22)
      • Volume 86, Issue 1 (2017), pp. 1-58 (1)
      • Volume 86, Issue 2 (2017), pp. 59-122 (1)
      • Volume 86, Issue 3 (2017), pp. 123-370 (20)
    • Volume 87 (2017), pp. 1-255 (20)
    • Volume 88(1,2) (2017), pp. 1-226 (11)
      • Volume 88, Issue 1 (2017), pp. 1-57 (1)
      • Volume 88, Issue 2 (2017), pp. 58-226 (10)
    • Volume 89 (2017), pp. 1-321 (33)
    • Volume 90 (2017), pp. 1-270 (20)
  • 2018 (486)
    • Volume 100 (2018), pp. 1-253 (20)
    • Volume 101 (2018), pp. 1-252 (20)
    • Volume 102 (2018), pp. 1-223 (20)
    • Volume 103 (2018), pp. 1-249 (18)
    • Volume 104 (2018), pp. 1-492 (40)
    • Volume 105 (2018), pp. 1-232 (20)
    • Volume 106 (2018), pp. 1-244 (20)
    • Volume 107 (2018), pp. 1-232 (20)
    • Volume 108 (2018), pp. 1-244 (20)
    • Volume 109 (2018), pp. 1-266 (19)
    • Volume 110 (2018), pp. 1-243 (20)
    • Volume 111 (2018), pp. 1-181 (17)
    • Volume 112 (2018), pp. 1-251 (20)
    • Volume 113 (2018), pp. 1-250 (26)
    • Volume 114 (2018), pp. 1-264 (20)
    • Volume 91 (2018), pp. 1-137 (10)
    • Volume 92(1,2) (2018), pp. 1-399 (21)
      • Volume 92, Issue 1 (2018), pp. 1-138 (1)
      • Volume 92, Issue 2 (2018), pp. 139-399 (20)
    • Volume 93 (2018), pp. 1-141 (15)
    • Volume 94(1,2) (2018), pp. 1-332 (21)
      • Volume 94, Issue 1 (2018), pp. 1-71 (1)
      • Volume 94, Issue 2 (2018), pp. 72-332 (20)
    • Volume 95 (2018), pp. 1-272 (20)
    • Volume 96 (2018), pp. 1-250 (20)
    • Volume 97 (2018), pp. 1-284 (20)
    • Volume 98 (2018), pp. 1-232 (20)
    • Volume 99 (2018), pp. 1-229 (19)
  • 2019 (467)
    • Volume 115 (2019), pp. 1-268 (20)
    • Volume 116 (2019), pp. 1-252 (19)
    • Volume 117 (2019), pp. 1-242 (20)
    • Volume 118 (2019), pp. 1-280 (20)
    • Volume 119 (2019), pp. 1-253 (20)
    • Volume 120(1,2) (2019), pp. 1-295 (21)
      • Volume 120, Issue 1 (2019), pp. 1-59 (1)
      • Volume 120, Issue 2 (2019), pp. 60-295 (20)
    • Volume 121 (2019), pp. 1-100 (13)
    • Volume 122 (2019), pp. 1-262 (20)
    • Volume 123 (2019), pp. 1-273 (20)
    • Volume 124(1,2) (2019), pp. 1-333 (21)
      • Volume 124, Issue 1 (2019), pp. 1-85 (1)
      • Volume 124, Issue 2 (2019), pp. 86-1-333 (20)
    • Volume 125 (2019), pp. 1-259 (20)
    • Volume 126 (2019), pp. 1-298 (20)
    • Volume 127(1,2,3) (2019), pp. 1-376 (22)
      • Volume 127, Issue 1 (2019), pp. 1-55 (1)
      • Volume 127, Issue 2 (2019), pp. 56-105 (1)
      • Volume 127, Issue 3 (2019), pp. 106-376 (20)
    • Volume 128(1,2) (2019), pp. 1-432 (21)
      • Volume 128, Issue 1 (2019), pp. 1-70 (1)
      • Volume 128, Issue 2 (2019), pp. 71-432 (20)
    • Volume 129 (2019), pp. 1-267 (20)
    • Volume 130 (2019), pp. 1-308 (20)
    • Volume 131 (2019), pp. 1-288 (20)
    • Volume 132 (2019), pp. 1-312 (24)
    • Volume 133 (2019), pp. 1-274 (20)
    • Volume 134(1,2) (2020), pp. 1-338 (21)
      • Volume 134, Issue 1 (2019), pp. 1-51 (1)
      • Volume 134, Issue 2 (2019), pp. 52-338 (20)
    • Volume 135 (2019), pp. 1-298 (22)
    • Volume 136 (2019), pp. 1-246 (16)
    • Volume 137 (2019), pp. 1-236 (14)
    • Volume 138(1,2) (2019), pp. 1-294 (13)
      • Volume 138, Issue 1 (2019), pp. 1-64 (1)
      • Volume 138, Issue 2 (2019), pp. 65-294 (12)
  • 2020 (179)
    • Volume 139(1,2) (2020), pp. 1-258 (13)
      • Volume 139, Issue 1 (2020), pp. 1-60 (1)
      • Volume 139, Issue 2 (2020), pp. 61-258 (12)
    • Volume 140 (2020), pp. 1-184 (10)
    • Volume 141 (2020), pp. 1-155 (10)
    • Volume 142 (2020), pp. 1-194 (12)
    • Volume 143 (2020), pp. 1-261 (16)
    • Volume 144 (2020), pp. 1-449 (30)
    • Volume 145 (2020), pp. 1-408 (30)
    • Volume 146 (2020), pp. 1-289 (18)
    • Volume 147 (2020), pp. 1-208 (12)
    • Volume 148 (2020), pp. 1-121 (8)
    • Volume 149 (2020), pp. 1-165 (10)
    • Volume 150 (2020), pp. 1-181 (10)
  • 2021 (143)
    • Volume 151 (2021), pp. 1-122 (8)
    • Volume 152 (2021), pp. 1-125 (8)
    • Volume 153(1,2) (2021), pp. 1-215 (13)
      • Volume 153, Issue 1 (2021), pp. 1-42 (1)
      • Volume 153, Issue 2 (2021), pp. 43-215 (12)
    • Volume 154 (2021), pp. 1-174 (10)
    • Volume 155 (2021), pp. 1-154 (10)
    • Volume 156 (2021), pp. 1-191 (12)
    • Volume 157 (2021), pp. 1-188 (10)
    • Volume 158 (2021), pp. 1-298 (16)
    • Volume 159 (2021), pp. 1-223 (14)
    • Volume 160 (2021), pp. 1-337 (20)
    • Volume 161 (2021), pp. 1-156 (10)
    • Volume 162 (2021), pp. 1-178 (12)
  • 2022 (125)
    • Volume 163 (2022), pp. 1-157 (8)
    • Volume 164 (2022), pp. 1-149 (8)
    • Volume 165 (2022), pp. 1-209 (12)
    • Volume 166 (2022), pp. 1-145 (10)
    • Volume 167 (2022), pp. 1-161 (9)
    • Volume 168 (2022), pp. 1-146 (10)
    • Volume 169 (2022), pp. 1-201 (10)
    • Volume 170 (2022), pp. 1-171 (10)
    • Volume 171 (2022), pp. 1-125 (8)
    • Volume 172 (2022), pp. 1-333 (20)
    • Volume 173 (2022), pp. 1-161 (10)
    • Volume 174 (2022), pp. 1-176 (10)
  • 2023 (132)
    • Volume 175 (2023), pp. 1-108 (8)
    • Volume 176 (2023), pp. 1-174 (10)
    • Volume 177 (2023), pp. 1-136 (8)
    • Volume 178 (2023), pp. 1-165 (10)
    • Volume 179 (2023), pp. 1-164 (10)
    • Volume 180 (2023), pp. 1-162 (12)
    • Volume 181 (2023), pp. 1-215 (12)
    • Volume 182 (2023), pp. 1-265 (18)
    • Volume 183 (2023), pp. 1-226 (14)
    • Volume 184 (2023), pp. 1-154 (10)
    • Volume 185 (2023), pp. 1-191 (10)
    • Volume 186 (2023), pp. 1-160 (10)
  • 2024 (183)
    • Volume 187 (2024), pp. 1-156 (10)
    • Volume 188 (2024), pp. 1-197 (12)
    • Volume 189 (2024), pp. 1-310 (20)
    • Volume 190(1,2) (2024), pp. 1-351 (18)
      • Volume 190, Issue 1 (2024), pp. 1-69 (1)
      • Volume 190, Issue 2 (2024), pp. 70-351 (17)
    • Volume 191 (2024), pp. 1-207 (12)
    • Volume 192 (2024), pp. 1-319 (20)
    • Volume 193(1,2) (2024), pp. 1-252 (13)
      • Volume 193, Issue 1 (2024), pp. 1-45 (1)
      • Volume 193, Issue 2 (2024), pp. 46-252 (12)
    • Volume 194 (2024), pp. 1-213 (13)
    • Volume 195 (2024), pp. 1-235 (13)
    • Volume 196 (2024), pp. 1-221 (14)
    • Volume 197 (2024), pp. 1-231 (15)
    • Volume 198 (2024), pp. 1-402 (23)
  • 2025 (169)
    • Volume 199 (2025), pp. 1-253 (16)
    • Volume 200 (2025), pp. 1-223 (14)
    • Volume 201 (2025), pp. 1-245 (12)
    • Volume 202 (2025), pp. 1-317 (17)
    • Volume 203 (2025), pp. 1-438 (15)
    • Volume 204 (2025), pp. 1-353 (19)
    • Volume 205 (2025), pp. 1-272 (16)
    • Volume 206 (2025), pp. 1-172 (13)
    • Volume 207 (2025), pp. 1-173 (12)
    • Volume 208 (2025), pp. 1-174 (11)
    • Volume 209 (2025), pp. 1-184 (12)
    • Volume 210 (2025), pp. 1-158 (12)
  • 2026 (21)
    • Volume 211 (2026), pp. (21)
  • Info (6)
  • News (3)
  • Open access (460)
  • Premium (38)

Last Articles

  • All
  • Premium
  • Open access

Development of a Decision Support System for Inventory Management in a Pharmaceutical Retail Outlet

2026-01-14

Evaluation research as a source of information – social work for the prevention of domestic violence

2024-01-26

History, Sculpture and Culture of Raghunath Jew Temple of Raghunath Bari, East Midnapore, India – A Photographic Essay

2024-01-13

Popular Articles

  • About Us

    About Us

    0 shares
    Share 0 Tweet 0
  • Submit your Article

    0 shares
    Share 0 Tweet 0
  • Jeevamrut – A Natural Fertilizer

    0 shares
    Share 0 Tweet 0
  • Abstracting & Indexing

    0 shares
    Share 0 Tweet 0
  • Guide for Authors

    0 shares
    Share 0 Tweet 0

Careers

  • All
  • Careers
No Content Available
World Scientific News

World Scientific News (WSN) is an open-access fully peer-reviewed scholarly journal. The monthly – interdisciplinary journal is directed in the first place to scientists who want to publish their findings, insights, observations, conclusions, etc.

READ MORE

Menu

  • Home
  • About Us
  • Editorial Board
  • Guide for Authors
  • Instruction for Authors
  • Abstracting & Indexing
  • Submit your Article
  • Careers
  • News

Other databases

AGRO
CAS
Google Scholar
Google Scholar Metrics
ICZN
ProQuest
Road Directory
ZooBank

EISSN 2392-2192

Login / Register
Privacy Policy
Cookie Policy

made by fixfix

No Result
View All Result
  • Home
  • About
    • About Us
    • Editorial Board
    • Guide for Authors
    • Abstracting & Indexing
    • Instruction for Authors
    • Submit your Article
  • View Articles
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
  • Careers
  • News

made by fixfix

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.