Results 31 to 40 of about 144,780 (287)

Malware in the Future? Forecasting of Analyst Detection of Cyber Events

open access: yes, 2018
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi   +51 more
core   +1 more source

Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]

open access: yes, 2019
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari   +17 more
core   +9 more sources

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Reality Check: assessing the (un)likelihood of cyberterrorism [PDF]

open access: yes, 2014
This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities.
Conway, Maura
core   +1 more source

Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure

open access: yesSensors, 2023
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs   +7 more
doaj   +1 more source

On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach

open access: yes, 2018
Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous organization. Nevertheless, the proof-of-work based
Feng, Shaohan   +5 more
core   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing

open access: yesAdvanced Science, EarlyView.
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia   +13 more
wiley   +1 more source

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

open access: yesIEEE Access, 2023
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis   +5 more
doaj   +1 more source

Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]

open access: yes, 2016
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core  

Home - About - Disclaimer - Privacy