Results 241 to 250 of about 144,780 (287)
Some of the next articles are maybe not open access.
Cyber-attacks and banking intermediation
Economics Letters, 2023Using data from 2144 U.S. banks over the period 2011-2019, this article highlights that cyber-attacks affect bank intermediation through a reduction in deposit collection, and credit supply.
openaire +2 more sources
2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
Scalable Detection of Cyber Attacks
2011Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
Massimiliano Albanese +3 more
openaire +2 more sources
2007
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources
Verifying cyber attack properties
Science of Computer Programming, 2017Abstract The heterogeneous, evolving and distributed nature of Cyber-Physical Systems (CPS) means that there is little chance of performing a top down development or anticipating all critical requirements such devices will need to satisfy individually and collectively.
Colin O'Halloran +2 more
openaire +1 more source
Cyber Security to Safeguard Cyber Attacks
International Journal of Information Security and Cybercrime, 2022A virtual world or an online world is referred to as cyberspace. It is a communication-enabled artificial world created by computers or internet-enabled devices or components. It is a web-based platform that allows users to interact and communicate with one another. Cybercrime is an area of crime that is rapidly expanding around the world.
openaire +1 more source
2012
The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured
openaire +1 more source
The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured
openaire +1 more source
Cyber attacks: the fog of identity
2016 International Conference on Cyber Conflict (CyCon U.S.), 2016Whether a criminal, warrior, terrorist, or spy, the rise of cyber attacks has created a whole new dimension to cyberspace. Despite the advancement of cyber security systems and multilateral security initiatives, the global electronic marketplace remains vulnerable to grave cyber intrusions.
openaire +1 more source
Staying ahead of cyber-attacks
Network Security, 2015As organisations become more dependent on technology as a business enabler, the security and reliability of their connectivity is growing in importance. Connected businesses are reliant on the Internet and networks to function, take advantage of opportunities and empower an increasingly mobile workforce.
openaire +1 more source
The challenge of cyber attack deterrence
Computer Law & Security Review, 2010Abstract National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to deterrence, a military strategy in which the purpose of armies shifted from winning wars to preventing them ...
openaire +1 more source

