Results 11 to 20 of about 137,074 (286)
Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats.
Lucas José Borges Amaro +5 more
doaj +1 more source
IMDfence: Architecting a Secure Protocol for Implantable Medical Devices
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi +2 more
doaj +1 more source
This study examines the phenomenon of disinformation as a threat in the realm of cybersecurity. We have analyzed multiple authoritative cybersecurity standards, manuals, handbooks, and literary works. We present the unanimous meaning and construct of the
Kevin Matthe Caramancion +3 more
doaj +1 more source
SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake ...
Aththaariq Rizki +1 more
doaj +1 more source
INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS
The threat of cyber warfare may disturb Indonesia's national interests. For this reason, efforts to create cyber defense forces are essential in dealing with the threat of cyberwar in this technological age.
Ahmad Candra +2 more
doaj +1 more source
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva +3 more
doaj +1 more source
Cyber Insurance – Effective Mechanism for Protection against Cyber Threat
Cyber insurance is a rapidly developing area which draws more and more attention of practitioners and researchers. Insurance, an alternative way to deal with residual risks, was only recently applied to the cyber world.
Nana Shonia +2 more
doaj +1 more source
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any ...
Abel Yeboah-Ofori +6 more
doaj +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately ...
Chao Liu +5 more
doaj +1 more source

