Results 221 to 230 of about 121,838 (272)
Some of the next articles are maybe not open access.

Cyber Security to Safeguard Cyber Attacks

International Journal of Information Security and Cybercrime, 2022
A virtual world or an online world is referred to as cyberspace. It is a communication-enabled artificial world created by computers or internet-enabled devices or components. It is a web-based platform that allows users to interact and communicate with one another. Cybercrime is an area of crime that is rapidly expanding around the world.
openaire   +1 more source

Foiling cyber attacks

2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire   +1 more source

Preventing Cyber-Attacks

2016
The first step in preventing a cyber-attack is to make sure that staff members are educated about potential threats, many of which arrive in their inbox. Hospitals are encouraged to enforce preventive behaviors that will benefit their entire network. Basic cyber-hygiene training of the workforce is a necessity.
openaire   +1 more source

Understanding Cyber-Attacks

Gurukul International Multidisciplinary Research Journal
Introduction Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
openaire   +1 more source

Cyber Terrorism Attacks

2007
Cyber terrorism is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against non-combatant targets by sub-national groups or clandestine agents. The possibilities created for cyber terrorism by the use of technology via the internet are vast.
Kevin Curran   +2 more
openaire   +1 more source

Scalable Detection of Cyber Attacks

2011
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
ALBANESE M   +3 more
openaire   +2 more sources

Deep Learning-based Anomaly Detection in Cyber-physical Systems

ACM Computing Surveys, 2022
Yuan Luo, Guojun Peng
exaly  

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain

ACM Computing Surveys, 2022
Ishai Rosenberg, Asaf Shabtai
exaly  

The AI-Based Cyber Threat Landscape

ACM Computing Surveys, 2021

exaly  

Home - About - Disclaimer - Privacy