Results 241 to 250 of about 31,297 (287)
Some of the next articles are maybe not open access.
Scalable Detection of Cyber Attacks
2011Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
Massimiliano Albanese +3 more
openaire +2 more sources
Verifying cyber attack properties
Science of Computer Programming, 2017Abstract The heterogeneous, evolving and distributed nature of Cyber-Physical Systems (CPS) means that there is little chance of performing a top down development or anticipating all critical requirements such devices will need to satisfy individually and collectively.
Colin O'Halloran +2 more
openaire +1 more source
2007
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources
Cyber-Attacks, Cryptocurrencies and Cyber Security
2023This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM +3 more
openaire +4 more sources
Cyber attacks: the fog of identity
2016 International Conference on Cyber Conflict (CyCon U.S.), 2016Whether a criminal, warrior, terrorist, or spy, the rise of cyber attacks has created a whole new dimension to cyberspace. Despite the advancement of cyber security systems and multilateral security initiatives, the global electronic marketplace remains vulnerable to grave cyber intrusions.
openaire +1 more source
Staying ahead of cyber-attacks
Network Security, 2015As organisations become more dependent on technology as a business enabler, the security and reliability of their connectivity is growing in importance. Connected businesses are reliant on the Internet and networks to function, take advantage of opportunities and empower an increasingly mobile workforce.
openaire +1 more source
The challenge of cyber attack deterrence
Computer Law & Security Review, 2010Abstract National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to deterrence, a military strategy in which the purpose of armies shifted from winning wars to preventing them ...
openaire +1 more source
New Electronics, 2020
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire +1 more source
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire +1 more source
Dark Sides of Cyber Attacks: Protection from the Assorted Cyber Attacks
Journal of Cyber Security, Privacy Issues and ChallengesCyber attacks have increased due to the quick development of digital communications, revealing a dark side where bad actors take advantage of system flaws to do serious damage. These assaults, which target people, businesses, and even governments, can take many different forms, such as ransomware, phishing, data breaches, and Advanced Persistent ...
S. Darshini +4 more
openaire +1 more source

