Results 191 to 200 of about 118,316 (239)
Some of the next articles are maybe not open access.

Deception in Cyber Attacks

2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire   +2 more sources

Predicting Consequences of Cyber-Attacks

2020 IEEE International Conference on Big Data (Big Data), 2020
Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces.
Prerit Datta   +3 more
openaire   +1 more source

Cyber-attacks and banking intermediation

Economics Letters, 2023
Using data from 2144 U.S. banks over the period 2011-2019, this article highlights that cyber-attacks affect bank intermediation through a reduction in deposit collection, and credit supply.
openaire   +2 more sources

Foiling cyber attacks

2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire   +1 more source

Scalable Detection of Cyber Attacks

2011
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
Massimiliano Albanese   +3 more
openaire   +2 more sources

Cyber Attacks

2007
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire   +2 more sources

Verifying cyber attack properties

Science of Computer Programming, 2017
Abstract The heterogeneous, evolving and distributed nature of Cyber-Physical Systems (CPS) means that there is little chance of performing a top down development or anticipating all critical requirements such devices will need to satisfy individually and collectively.
Colin O'Halloran   +2 more
openaire   +1 more source

Cyber Security to Safeguard Cyber Attacks

International Journal of Information Security and Cybercrime, 2022
A virtual world or an online world is referred to as cyberspace. It is a communication-enabled artificial world created by computers or internet-enabled devices or components. It is a web-based platform that allows users to interact and communicate with one another. Cybercrime is an area of crime that is rapidly expanding around the world.
openaire   +1 more source

The Cyber-Physical Attacker

2012
The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured
openaire   +1 more source

Cyber attacks: the fog of identity

2016 International Conference on Cyber Conflict (CyCon U.S.), 2016
Whether a criminal, warrior, terrorist, or spy, the rise of cyber attacks has created a whole new dimension to cyberspace. Despite the advancement of cyber security systems and multilateral security initiatives, the global electronic marketplace remains vulnerable to grave cyber intrusions.
openaire   +1 more source

Home - About - Disclaimer - Privacy