Results 241 to 250 of about 280,474 (284)
Some of the next articles are maybe not open access.

The A-Z of cyber security

Network Security, 2021
I have gained inspiration from the Human Factors in Diving community to start an 'A-Z of cyber security’.1 Last time, we did M-P; in this column, I'm wrapping up the series with the remaining letters, with appropriate topics. Q & X - Questions & the uneXpected: In cyber security, and in the era of generational AI, we should always question our ...
openaire   +2 more sources

Anticipation in Cyber-security

2017
Organisations, governments and users are increasingly vulnerable to cyberattacks, which effects may range from threatening the foundation of modern information society, to causing catastrophic failure of nation-wide critical infrastructure. As a result, a great deal of effort has been given to mitigating the risks stemming from cyber-attacks and has ...
Ahrend, JM, Jirotka, M
openaire   +1 more source

e-Government and Cyber Security: The Role of Cyber Security Exercises

Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce solutions. The span of control of e-government and its impact across a community defines a system that is more than a sum of just single systems.
Art Conklin, Gregory B. White
openaire   +1 more source

Cyber security training a survey of serious games in cyber security

2017 IEEE Frontiers in Education Conference (FIE), 2017
Within the field of computer and information security, there has been a relatively recent surge of interest on a multitude of topics, ranging from secure programming practices, protocols and algorithm design to cryptography and ethics. However, this body of research typically focuses on the implementation or theory of security controls and mechanisms ...
Jin-Ning Tioh   +2 more
openaire   +1 more source

Minitrack: Cyber Security

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007
Like other parts of the economy, the electric power infrastructure is increasingly dependent on accurate and timely exchange of information for operations and markets. Vulnerabilities in the cyber infrastructure that supports this information exchange create risks for the reliability, efficiency and integrity of the power system.
openaire   +1 more source

Social Cyber-Security

2018
Social Cyber-Security is an emerging scientific discipline. Its methodological and scientific foundation, key challenges, and scientific direction are described. The multi-disciplinary nature of this field and its emphasis on dynamic information strategies is considered.
Kathleen M. Carley   +3 more
openaire   +1 more source

Hardware cyber security

Proceedings of the 2014 on International symposium on physical design, 2014
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire   +1 more source

Rethinking cyber security

Proceedings of the 4th international conference on Security of information and networks, 2011
It is clear that the Internet is transforming the way we live and the recent decades have witnessed dramatic developments in information and communication technologies (ICT). Along with the phenomenal growth in technology enabled information economy has been a growth in computing technology related crimes.
openaire   +1 more source

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

International Journal of Cyber Warfare and Terrorism, 2013
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them.
openaire   +1 more source

Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments

2012
This paper discusses the use of cyber security exercises and competitions to produce data valuable for security research. Cyber security exercises and competitions are primarily arranged to train participants and/or to offer competence contests for those with a profound interest in security.
Teodor Sommestad, Jonas Hallberg
openaire   +1 more source

Home - About - Disclaimer - Privacy