Results 221 to 230 of about 121,838 (272)
Some of the next articles are maybe not open access.
Cyber Security to Safeguard Cyber Attacks
International Journal of Information Security and Cybercrime, 2022A virtual world or an online world is referred to as cyberspace. It is a communication-enabled artificial world created by computers or internet-enabled devices or components. It is a web-based platform that allows users to interact and communicate with one another. Cybercrime is an area of crime that is rapidly expanding around the world.
openaire +1 more source
2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
2016
The first step in preventing a cyber-attack is to make sure that staff members are educated about potential threats, many of which arrive in their inbox. Hospitals are encouraged to enforce preventive behaviors that will benefit their entire network. Basic cyber-hygiene training of the workforce is a necessity.
openaire +1 more source
The first step in preventing a cyber-attack is to make sure that staff members are educated about potential threats, many of which arrive in their inbox. Hospitals are encouraged to enforce preventive behaviors that will benefit their entire network. Basic cyber-hygiene training of the workforce is a necessity.
openaire +1 more source
Gurukul International Multidisciplinary Research Journal
Introduction Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
openaire +1 more source
Introduction Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
openaire +1 more source
2007
Cyber terrorism is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against non-combatant targets by sub-national groups or clandestine agents. The possibilities created for cyber terrorism by the use of technology via the internet are vast.
Kevin Curran +2 more
openaire +1 more source
Cyber terrorism is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against non-combatant targets by sub-national groups or clandestine agents. The possibilities created for cyber terrorism by the use of technology via the internet are vast.
Kevin Curran +2 more
openaire +1 more source
Scalable Detection of Cyber Attacks
2011Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
ALBANESE M +3 more
openaire +2 more sources
Deep Learning-based Anomaly Detection in Cyber-physical Systems
ACM Computing Surveys, 2022Yuan Luo, Guojun Peng
exaly
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
ACM Computing Surveys, 2022Ishai Rosenberg, Asaf Shabtai
exaly

