Results 201 to 210 of about 1,279,940 (244)
Some of the next articles are maybe not open access.
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
IEEE Communications Surveys and Tutorials, 2023Nan Sun, Ming Ding, Jiaojiao Jiang
exaly
In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices.
openaire +1 more source
openaire +1 more source
Cyber-aggression, Cyberbullying, and Cyber-grooming
ACM Computing Surveys, 2022Miljana Mladenović +1 more
exaly
2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Machine Learning–based Cyber Attacks Targeting on Controlled Information
ACM Computing Surveys, 2022Chao Chen, Lei Pan, Qing-Long Han
exaly
2006
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems.
openaire +1 more source
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems.
openaire +1 more source

