Results 231 to 240 of about 144,780 (287)
Artificial intelligence driven multi agent framework for adaptive cyber attack simulation and automated incident response in cyber range environments. [PDF]
Agrawal A +3 more
europepmc +1 more source
Empowering the nursing workforce for cyber-resilience: Strategic preparedness and care management during hospital cyberattacks. [PDF]
Dorosti AM +3 more
europepmc +1 more source
Prediction-based attack detection and mitigation mechanism in power system. [PDF]
Zhai P, Zhang M, Wang X.
europepmc +1 more source
Football cybersecurity threat severity prediction using multi-head transformer-based deep learning models. [PDF]
Hassan BM +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyber-Attacks, Cryptocurrencies and Cyber Security
2023This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM +3 more
openaire +4 more sources
Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire +1 more source
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire +1 more source
International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
S. Sibi Chakkaravarthy +4 more
openaire +1 more source
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
S. Sibi Chakkaravarthy +4 more
openaire +1 more source
2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Predicting Consequences of Cyber-Attacks
2020 IEEE International Conference on Big Data (Big Data), 2020Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces.
Prerit Datta +3 more
openaire +1 more source

