Results 231 to 240 of about 139,452 (290)
The U.S. health system vulnerabilities. [PDF]
Brantly ND.
europepmc +1 more source
ABSTRACT Context The microservices architectural style has revolutionized the way modern software systems are developed and operated. While the development of new microservices systems can leverage a wide range of resources and proven strategies, the migration of an existing monolithic system is not easily generalizable.
Jonas Fritzsch +6 more
wiley +1 more source
Algorithm Perception When Using Threat Intelligence in Vulnerability Risk Assessment. [PDF]
van Gerwen S +3 more
europepmc +1 more source
Integrating AI in security information and event management for real time cyber defense. [PDF]
Khan S +4 more
europepmc +1 more source
Latent topic-driven cyber intelligence model for tactics, techniques, and procedures (TTPs) detection using hybrid framework and Birch-inspired optimisation. [PDF]
Alanazi MM, Wahab AWA, Idris MYI.
europepmc +1 more source
Prediction-based attack detection and mitigation mechanism in power system. [PDF]
Zhai P, Zhang M, Wang X.
europepmc +1 more source
Cybersecurity governance in the healthcare sector during digital transformation: an integrated model and hybrid analytical approach. [PDF]
Alharbi A, Alkhalifah A.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Combating the Insider Cyber Threat
IEEE Security & Privacy Magazine, 2008The penetration of US national security by foreign agents as well as American citizens is a historical and current reality that's a persistent and increasing phenomenon. Surveys, such as the e-crime watch survey, reveal that current or former employees and contractors are the second greatest cybersecurity threat, exceeded only by hackers, and that the ...
Frank L. Greitzer +5 more
openaire +1 more source
Cyber Threat Intelligence Exchange
2020Die Verarbeitung und der Austausch von Cyber Threat Intelligence (CTI) Informationen haben in den Vergangenen Jahren immer stärker an Bedeutung gewonnen. Dies kann auf verschiedene Faktoren zurückgeführt werden. Auf der einen Seite bietet der Informationsaustausch ein großes Potential die Informationsbasis von Unternehmen zu stärken und damit den ...
openaire +2 more sources

