Results 231 to 240 of about 31,297 (287)
Some of the next articles are maybe not open access.

Related searches:

Discussing cyber attack

Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire   +1 more source

Futuristic cyber-attacks

International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
S. Sibi Chakkaravarthy   +4 more
openaire   +1 more source

Predicting Consequences of Cyber-Attacks

2020 IEEE International Conference on Big Data (Big Data), 2020
Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces.
Prerit Datta   +3 more
openaire   +1 more source

Deception in Cyber Attacks

2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire   +2 more sources

Cyber-attacks and banking intermediation

Economics Letters, 2023
Using data from 2144 U.S. banks over the period 2011-2019, this article highlights that cyber-attacks affect bank intermediation through a reduction in deposit collection, and credit supply.
openaire   +2 more sources

Foiling cyber attacks

2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire   +1 more source

Home - About - Disclaimer - Privacy