Results 101 to 110 of about 137,873 (290)
The Australian Cyber Security Centre threat report 2015 [PDF]
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core
The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core +1 more source
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Cyber threats are becoming increasingly diverse, sophisticated, and intelligent, posing significant challenges in various domains. Among these threats, advanced persistent threat (APT) attacks are particularly concerning because of sustained and ...
Hyoungjun Kim +2 more
doaj +1 more source
ABSTRACT Smart energy management systems (EMS) are entering a phase of rapid transformation. Artificial intelligence (AI)—including machine learning (ML), deep learning (DL), and reinforcement learning (RL)—has become the computational backbone for real‐time forecasting, scheduling, and control of renewable‐rich power systems.
Sihai An +5 more
wiley +1 more source
An Iterative Review Inspired Adaptive Cyber Threat Detection Model with Context Awareness & Meta-Learning with Generative Hybrid Anomaly Detection [PDF]
Al-driven cyber security frameworks must adapt to more sophisticated threats and context-based detections. We can improve interpretability, flexibility, and resilience in data-scarce and hostile settings in the current model.
Rajurkar Jayant, Jogekar Ravindra
doaj +1 more source
This article provides an overview of cyber threats in education and other industries, DDoS attacks and types, cyber threat index overview, web application attacks, application security threats, data security, DDoS threats, daily attack mapping, network security problems and their prevention actions are highlighted.
openaire +1 more source
Maritime Cyber Threats and Challenges
The maritime trade becomes crucial for countries' economy, security and sovereignty. Side by side to the growth of shipping, the vessels themselves and the sea-ports become more and more sophisticated, advanced and controlled by computerized and automated systems.
openaire +2 more sources
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi +5 more
wiley +1 more source
Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core

