Results 191 to 200 of about 118,316 (239)
Some of the next articles are maybe not open access.
2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Predicting Consequences of Cyber-Attacks
2020 IEEE International Conference on Big Data (Big Data), 2020Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces.
Prerit Datta +3 more
openaire +1 more source
Cyber-attacks and banking intermediation
Economics Letters, 2023Using data from 2144 U.S. banks over the period 2011-2019, this article highlights that cyber-attacks affect bank intermediation through a reduction in deposit collection, and credit supply.
openaire +2 more sources
2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
Scalable Detection of Cyber Attacks
2011Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
Massimiliano Albanese +3 more
openaire +2 more sources
2007
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources
Verifying cyber attack properties
Science of Computer Programming, 2017Abstract The heterogeneous, evolving and distributed nature of Cyber-Physical Systems (CPS) means that there is little chance of performing a top down development or anticipating all critical requirements such devices will need to satisfy individually and collectively.
Colin O'Halloran +2 more
openaire +1 more source
Cyber Security to Safeguard Cyber Attacks
International Journal of Information Security and Cybercrime, 2022A virtual world or an online world is referred to as cyberspace. It is a communication-enabled artificial world created by computers or internet-enabled devices or components. It is a web-based platform that allows users to interact and communicate with one another. Cybercrime is an area of crime that is rapidly expanding around the world.
openaire +1 more source
2012
The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured
openaire +1 more source
The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured
openaire +1 more source
Cyber attacks: the fog of identity
2016 International Conference on Cyber Conflict (CyCon U.S.), 2016Whether a criminal, warrior, terrorist, or spy, the rise of cyber attacks has created a whole new dimension to cyberspace. Despite the advancement of cyber security systems and multilateral security initiatives, the global electronic marketplace remains vulnerable to grave cyber intrusions.
openaire +1 more source

