Results 231 to 240 of about 31,297 (287)
Empowering the nursing workforce for cyber-resilience: Strategic preparedness and care management during hospital cyberattacks. [PDF]
Dorosti AM +3 more
europepmc +1 more source
Windows-APT 2025: A dataset for APT-inspired attack scenarios on windows systems. [PDF]
Mozaffari M +2 more
europepmc +1 more source
Evaluating Synthetic Cyber Deception Strategies Under Uncertainty via Game Theory Approach: Linking Information Leakage and Game Outcomes in Cyber Deception. [PDF]
Shahin M, Maghanaki M, Chen FF.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire +1 more source
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire +1 more source
International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
S. Sibi Chakkaravarthy +4 more
openaire +1 more source
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
S. Sibi Chakkaravarthy +4 more
openaire +1 more source
Predicting Consequences of Cyber-Attacks
2020 IEEE International Conference on Big Data (Big Data), 2020Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces.
Prerit Datta +3 more
openaire +1 more source
2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Cyber-attacks and banking intermediation
Economics Letters, 2023Using data from 2144 U.S. banks over the period 2011-2019, this article highlights that cyber-attacks affect bank intermediation through a reduction in deposit collection, and credit supply.
openaire +2 more sources
2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source

