Results 241 to 250 of about 111,415 (271)
Some of the next articles are maybe not open access.
Anticipation in Cyber-security
2017Organisations, governments and users are increasingly vulnerable to cyberattacks, which effects may range from threatening the foundation of modern information society, to causing catastrophic failure of nation-wide critical infrastructure. As a result, a great deal of effort has been given to mitigating the risks stemming from cyber-attacks and has ...
Ahrend, JM, Jirotka, M
openaire +1 more source
2020
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence.
openaire +2 more sources
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence.
openaire +2 more sources
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020
We developed an educational serious game to teach basic cybersecurity concepts to novices. An evaluation of the game on introductory Computer Science and Business students suggests that playing the game resulted in both short-term learning gains in cybersecurity as well as longer-term retention of the concepts.
Devorah Kletenik +4 more
openaire +1 more source
We developed an educational serious game to teach basic cybersecurity concepts to novices. An evaluation of the game on introductory Computer Science and Business students suggests that playing the game resulted in both short-term learning gains in cybersecurity as well as longer-term retention of the concepts.
Devorah Kletenik +4 more
openaire +1 more source
A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design
IEEE Communications Surveys and Tutorials, 2022Sangjun Kim +2 more
exaly
A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
IEEE Communications Surveys and Tutorials, 2021Daniel Schlette, Marco Caselli
exaly
Security and Privacy in the Emerging Cyber-Physical World: A Survey
IEEE Communications Surveys and Tutorials, 2021Zhiyuan Yu, Zack Kaplan, Qiben Yan
exaly

