Results 91 to 100 of about 139,452 (290)

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Countering Autonomous Cyber Threats

open access: yesCoRR
With the capability to write convincing and fluent natural language and generate code, Foundation Models present dual-use concerns broadly and within the cyber domain specifically. Generative AI has already begun to impact cyberspace through a broad illicit marketplace for assisting malware development and social engineering attacks through hundreds of
Kade M. Heckel, Adrian Weller
openaire   +2 more sources

A Study of Cyber Security and Cyber Threats

open access: yesCGC International Journal of Contemporary Technology and Research, 2020
Cybersecurity has a vital role in Information Technology. The cybersecurity security involves the security on data/information stored in various devices present on different networks. However, it is very difficult to secure information in today’s world because of the increasing number of devices like computer systems, mobile phones, televisions, etc ...
openaire   +1 more source

Systems‐Based Organisational Resilience Framework: A Delphi Study‐Based Validation and Verification

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT The increasing systemic complexity of the Fourth Industrial Revolution has heightened the need for robust approaches to organisational resilience. Despite its growing prominence, resilience research remains fragmented, with limited consensus on core dimensions, causal interdependencies and mechanisms suitable for dynamic assessment. This study
Dumisani Manzini   +3 more
wiley   +1 more source

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework

open access: yesIEEE Open Journal of the Computer Society
Automating cyber threat intelligence (CTI) collection and analysis in real time is critical for the timely detection and mitigation of cyber threats. Cybersecurity researchers have recently recommended CTI as a proactive and robust method for automated ...
Alemayehu Tilahun Haile   +2 more
doaj   +1 more source

The Challenge of Ensuring Business Security in Information Age [PDF]

open access: yes
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU   +2 more
core  

Digital Engineering Transformation as a Sociotechnical Challenge: Categorization of Barriers and Their Mapping to DoD's Policy Goals

open access: yesSystems Engineering, EarlyView.
ABSTRACT Digital Engineering (DE) transformation represents a paradigm shift in systems engineering (SE), aiming to integrate heterogeneous analytical models and digital artifacts into an authoritative source of truth to improve traceability and lifecycle management.
Md Doulotuzzaman Xames, Taylan G. Topcu
wiley   +1 more source

Bayesian Stackelberg game approach for cyber mission impact assessment

open access: yesICT Express
Cyber threats increasingly target mission-critical systems in the military and private sectors. CMIA has emerged to mitigate such cyber threats and assure the resilience of critical missions.
Donghwan Lee   +3 more
doaj   +1 more source

Threat Analysis of Power System Case Study via STRIDE Threat Model in Digital Twin Real-time Platform [PDF]

open access: yesEPJ Web of Conferences
Threat modeling is a pivotal analytical procedure employed to specify the potential threats and select the appropriate security measures. It helps reduce the risk of cyber-attacks that may target several components of the cyber-physical power systems ...
Muhsen Hani   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy