Results 91 to 100 of about 139,452 (290)
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Countering Autonomous Cyber Threats
With the capability to write convincing and fluent natural language and generate code, Foundation Models present dual-use concerns broadly and within the cyber domain specifically. Generative AI has already begun to impact cyberspace through a broad illicit marketplace for assisting malware development and social engineering attacks through hundreds of
Kade M. Heckel, Adrian Weller
openaire +2 more sources
A Study of Cyber Security and Cyber Threats
Cybersecurity has a vital role in Information Technology. The cybersecurity security involves the security on data/information stored in various devices present on different networks. However, it is very difficult to secure information in today’s world because of the increasing number of devices like computer systems, mobile phones, televisions, etc ...
openaire +1 more source
Systems‐Based Organisational Resilience Framework: A Delphi Study‐Based Validation and Verification
ABSTRACT The increasing systemic complexity of the Fourth Industrial Revolution has heightened the need for robust approaches to organisational resilience. Despite its growing prominence, resilience research remains fragmented, with limited consensus on core dimensions, causal interdependencies and mechanisms suitable for dynamic assessment. This study
Dumisani Manzini +3 more
wiley +1 more source
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework
Automating cyber threat intelligence (CTI) collection and analysis in real time is critical for the timely detection and mitigation of cyber threats. Cybersecurity researchers have recently recommended CTI as a proactive and robust method for automated ...
Alemayehu Tilahun Haile +2 more
doaj +1 more source
The Challenge of Ensuring Business Security in Information Age [PDF]
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU +2 more
core
ABSTRACT Digital Engineering (DE) transformation represents a paradigm shift in systems engineering (SE), aiming to integrate heterogeneous analytical models and digital artifacts into an authoritative source of truth to improve traceability and lifecycle management.
Md Doulotuzzaman Xames, Taylan G. Topcu
wiley +1 more source
Bayesian Stackelberg game approach for cyber mission impact assessment
Cyber threats increasingly target mission-critical systems in the military and private sectors. CMIA has emerged to mitigate such cyber threats and assure the resilience of critical missions.
Donghwan Lee +3 more
doaj +1 more source
Threat Analysis of Power System Case Study via STRIDE Threat Model in Digital Twin Real-time Platform [PDF]
Threat modeling is a pivotal analytical procedure employed to specify the potential threats and select the appropriate security measures. It helps reduce the risk of cyber-attacks that may target several components of the cyber-physical power systems ...
Muhsen Hani +5 more
doaj +1 more source

