Results 61 to 70 of about 1,279,940 (244)
USBcat - Towards an Intrusion Surveillance Toolset
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner.
Chapman, Chris, Dean, Tom, Knight, Scott
core +2 more sources
Senior corporate executives, government officials, and academics have become aware that there are: i) serious financial and regulatory costs arising from cyber-attacks (Pearson, 2014; Sugarman, 2014; US Securities and Exchange Commission, 2014); ii) vulnerabilities in high-value assets such as supervisory-control and dataacquisition systems (Ashford ...
openaire +1 more source
Quantitative Risk Assessment of Cyber Attacks on Cyber-Physical Systems using Attack Graphs
Over the past decade, the number of cyber attack incidents targeting critical infrastructures such as the electrical power system has increased. To assess the risk of cyber attacks on the cyber-physical system, a holistic approach is needed that ...
Ioannis Semertzis +4 more
semanticscholar +1 more source
Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts
Burton Joe
doaj +1 more source
The now ubiquitous use of information technology poses a crucial challenge to the cyber security of power grid operations, one that has aroused serious concerns from both industry and academia.
Xiaoge Huang, Zhijun Qin, Hui Liu
doaj +1 more source
Cyber security and the unexplored threat to global health: a call for global norms
Cyber-attacks against hospitals, medical devices, and healthcare entities are becoming increasingly common; simultaneously, physical attacks against hospitals and healthcare entities are increasing. The purpose of this article is to explore the threat to
Rose Bernard +2 more
doaj +1 more source
Predicting Cyber Events by Leveraging Hacker Sentiment
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok +2 more
core +1 more source
There is increasing enthusiasm for, and recognition of, the benefits that artificial intelligence (AI) can provide to society. The emphasis has been on the positive, but AI and deep learning can be used for negative purposes. Modular Neural Networks (MNN) are capable of independent learning and have been targeted at evolutionary, complex financial ...
Angela Mison, Gareth Davies, Peter Eden
openaire +2 more sources
Recently, the Internet of Things (IoT) has an important role in the growth and development of digitalized electric power stations while offering ambitious opportunities, specifically real-time monitoring and cybersecurity.
M. Elsisi +5 more
semanticscholar +1 more source
APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS [PDF]
Technology plays an important role in everyday life. Technological advancement can be found in every field of government including the military. Because of this, new means and methods of conducting hostilities have emerged.
Dan-Iulian VOITAŞEC
doaj

