Results 181 to 190 of about 52,803 (214)

Risk Science in Practice: A Framework for Gauging Risk Principles in Domain‐Specific Discourse

open access: yesRisk Analysis, Volume 46, Issue 2, February 2026.
ABSTRACT Risk science is increasingly interwoven across various domains, aiming to be both generalizable and domain‐specific to build consistency and applicability across risk applications. However, those risk discussions, such as in materials that aim to share risk‐related information with stakeholders, may have varying levels of alignment with risk ...
Shital Thekdi, Terje Aven
wiley   +1 more source

Crisis Preparedness and Systemic Risk: The Role of Municipal Leaders in Disaster Risk Governance in Norway

open access: yesScandinavian Journal of Psychology, Volume 67, Issue 1, Page 115-128, February 2026.
ABSTRACT This study explores how Norwegian leaders in rural municipalities attend to disaster risk governance and prepare for resilient response to threats from systemic, interconnected, and cascading hazards. Systemic risk management in the Norwegian municipalities will depend on the context and how critical organizational processes are managed by the
Sofie Steinsund   +3 more
wiley   +1 more source

Discussing cyber attack

Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire   +1 more source

Futuristic cyber-attacks

International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
Sibi Chakkaravarthy, S.   +4 more
openaire   +1 more source

Detecting Cyber-Attacks

New Electronics, 2020
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire   +1 more source

Foiling cyber attacks

2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire   +1 more source

Scalable Detection of Cyber Attacks

2011
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
ALBANESE M   +3 more
openaire   +2 more sources

Preventing Cyber-Attacks

2016
The first step in preventing a cyber-attack is to make sure that staff members are educated about potential threats, many of which arrive in their inbox. Hospitals are encouraged to enforce preventive behaviors that will benefit their entire network. Basic cyber-hygiene training of the workforce is a necessity.
openaire   +1 more source

Understanding Cyber-Attacks

Gurukul International Multidisciplinary Research Journal
Introduction Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
openaire   +1 more source

Dark Sides of Cyber Attacks: Protection from the Assorted Cyber Attacks

Journal of Cyber Security, Privacy Issues and Challenges
Cyber attacks have increased due to the quick development of digital communications, revealing a dark side where bad actors take advantage of system flaws to do serious damage. These assaults, which target people, businesses, and even governments, can take many different forms, such as ransomware, phishing, data breaches, and Advanced Persistent ...
S. Darshini   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy