Results 11 to 20 of about 137,074 (286)

Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data

open access: yesApplied Sciences, 2022
Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats.
Lucas José Borges Amaro   +5 more
doaj   +1 more source

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

open access: yesIEEE Access, 2020
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi   +2 more
doaj   +1 more source

The Missing Case of Disinformation from the Cybersecurity Risk Continuum: A Comparative Assessment of Disinformation with Other Cyber Threats

open access: yesData, 2022
This study examines the phenomenon of disinformation as a threat in the realm of cybersecurity. We have analyzed multiple authoritative cybersecurity standards, manuals, handbooks, and literary works. We present the unanimous meaning and construct of the
Kevin Matthe Caramancion   +3 more
doaj   +1 more source

SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS

open access: yesJournal of Social Political Sciences, 2021
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake ...
Aththaariq Rizki   +1 more
doaj   +1 more source

INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS

open access: yesJurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity, 2021
The threat of cyber warfare may disturb Indonesia's national interests. For this reason, efforts to create cyber defense forces are essential in dealing with the threat of cyberwar in this technological age.
Ahmad Candra   +2 more
doaj   +1 more source

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

open access: yesFuture Internet, 2020
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva   +3 more
doaj   +1 more source

Cyber Insurance – Effective Mechanism for Protection against Cyber Threat

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2020
Cyber insurance is a rapidly developing area which draws more and more attention of practitioners and researchers. Insurance, an alternative way to deal with residual risks, was only recently applied to the cyber world.
Nana Shonia   +2 more
doaj   +1 more source

Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security

open access: yesIEEE Access, 2021
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any ...
Abel Yeboah-Ofori   +6 more
doaj   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

TCFLTformer: TextCNN-Flat-Lattice Transformer for Entity Recognition of Air Traffic Management Cyber Threat Knowledge Graphs

open access: yesAerospace, 2023
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately ...
Chao Liu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy