Results 21 to 30 of about 139,452 (290)

TCFLTformer: TextCNN-Flat-Lattice Transformer for Entity Recognition of Air Traffic Management Cyber Threat Knowledge Graphs

open access: yesAerospace, 2023
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately ...
Chao Liu   +5 more
doaj   +1 more source

Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security

open access: yesIEEE Access, 2021
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any ...
Abel Yeboah-Ofori   +6 more
doaj   +1 more source

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

open access: yesComputers, 2020
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation.
Konstantinos Rantos   +5 more
doaj   +1 more source

Dynamic Assessment of Cyber Threats in the Field of Insurance

open access: yesRisks, 2022
The area of digital technologies is currently the subject of many cyber threats, the frequency of which is increasing. One of the areas of cyber security is also the creation of models and estimates of the process of cyber threats and their possible ...
Lukáš Pavlík, Martin Ficek, Jakub Rak
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Enabling Collaborative Forensic by Design for the Internet of Vehicles

open access: yesInformation
The progress in automotive technology, communication protocols, and embedded systems has propelled the development of the Internet of Vehicles (IoV). In this system, each vehicle acts as a sophisticated sensing platform that collects environmental and ...
Ahmed M. Elmisery, Mirela Sertovic
doaj   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Combining Sociocultural Intelligence with Artificial Intelligence to Increase Organizational Cyber Security Provision through Enhanced Resilience

open access: yesBig Data and Cognitive Computing, 2022
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj   +1 more source

Malware in the Future? Forecasting of Analyst Detection of Cyber Events

open access: yes, 2018
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi   +51 more
core   +1 more source

STRATEGI INDONESIA MEMBENTUK CYBER SECURITY DALAM MENGHADAPI ANCAMAN CYBER CRIME MELALUI BADAN SIBER DAN SANDI NEGARA

open access: yesDinamika Global, 2022
Cyber security has become a priority issue for all countries in the world since information and communication technology is used in various aspects of life, both in social, economic, legal, organizational, health, education, culture, government ...
Yusep Ginanjar
doaj   +1 more source

Home - About - Disclaimer - Privacy