Results 31 to 40 of about 137,074 (286)

Rekonstruksi Pembentukan National Cyber Defense Sebagai Upaya Mempertahankan Kedaulatan Negara [PDF]

open access: yes, 2016
Kecemasan terhadap cyber crime telah menjadi perhatian dunia, namun tidak semua negara di dunia ini memberikan perhatian yang lebih besar terhadap masalah cyber crime dan memiliki peraturannya kecuali negara-negara maju dan beberapa negara berkembang ...
Sa\u27diyah, N. K. (Nur)   +1 more
core   +3 more sources

Cyber Threat Hunting

open access: yesInternational Journal of Cognitive Informatics and Natural Intelligence, 2021
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries.
openaire   +1 more source

A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness

open access: yesFrontiers in Big Data, 2023
BackgroundCyber defense decision-making during cyber threat situations is based on human-to-human communication aiming to establish a shared cyber situational awareness.
Torvald F. Ask   +12 more
doaj   +1 more source

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

open access: yesJournal of Cybersecurity and Privacy
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and ...
Habib El Amin   +4 more
doaj   +1 more source

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

The Influence of South Africa’s Democratic Principles on its Cybersecurity Framework and Cyber Threat Response

open access: yesJournal of BRICS Studies
This study explores the intricate relationship between South Africa's democratic political system, its commitment to human and private rights, and the development of its cybersecurity framework, strategy, and response to cyber threats. Given the country'
Venencia Paidamoyo Nyambuya   +1 more
doaj   +1 more source

STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION

open access: yesJurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity, 2019
In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security.
Miftah Farid, Ajeng Ayu Adhisty
doaj   +1 more source

Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure [PDF]

open access: yesJournal of Universal Computer Science, 2019
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security ...
Halima Kure, Shareeful Islam
doaj   +3 more sources

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]

open access: yes, 2015
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M   +12 more
core  

Home - About - Disclaimer - Privacy