Results 31 to 40 of about 118,316 (239)
Weaponized AI for cyber attacks
Abstract Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies for offensive purposes has begun to appear in the world.
Muhammad Mudassar Yamin +3 more
openaire +2 more sources
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Wired warfare 3.0: protecting the civilian population during cyber operations [PDF]
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree ...
Dinniss +15 more
core +2 more sources
The security and stability control system is an important defense line to ensure the reliable operation of the power grid. Serious physical consequences can be caused by cyber attacks against the security and stability control system.
QIAN Sheng +4 more
doaj +1 more source
Algorithm Selection Framework for Cyber Attack Detection
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman +15 more
core +1 more source
HARMer: Cyber-Attacks Automation and Evaluation [PDF]
Con el creciente crecimiento de las incidencias de ciberataques, es importante desarrollar técnicas innovadoras y efectivas para evaluar y defender los sistemas en red contra los ciberataques. Una de las técnicas más conocidas para ello es la realización de pruebas de penetración que lleva a cabo un grupo de profesionales de la seguridad (es decir, el ...
Simon Yusuf Enoch +5 more
openaire +5 more sources
A Cyber Security Approach Using Multilayer Cryptographic System
The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose.
Kamaran Adil Ibrahim +4 more
doaj +1 more source
Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as ...
Insup Lee, Changhee Choi
doaj +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
Impact of Cyber Attacks on High Voltage DC Transmission Damping Control
Hybrid AC/HVDC (AC-HVDC) grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication ...
Rui Fan +3 more
doaj +1 more source

