Results 31 to 40 of about 139,452 (290)
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and ...
Habib El Amin +4 more
doaj +1 more source
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure [PDF]
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security ...
Halima Kure, Shareeful Islam
doaj +3 more sources
Unifying Cyber Threat Intelligence [PDF]
The threat landscape and the associated number of IT security incidents are constantly increasing. In order to address this problem, a trend towards cooperative approaches and the exchange of information on security incidents has been developing over recent years. Today, several different data formats with varying properties are available that allow to
Menges, Florian +2 more
openaire +2 more sources
Toward Environmentally Friendly Hydrogel‐Based Flexible Intelligent Sensor Systems
This review summarizes environmentally and biologically friendly hydrogel‐based flexible sensor systems focusing on physical, chemical, and physiological sensors. Furthermore, device concepts moving forward for the practical application are discussed about wireless integration, the interface between hydrogel and dry electronics, automatic data analysis
Sudipta Kumar Sarkar, Kuniharu Takei
wiley +1 more source
This study explores the intricate relationship between South Africa's democratic political system, its commitment to human and private rights, and the development of its cybersecurity framework, strategy, and response to cyber threats. Given the country'
Venencia Paidamoyo Nyambuya +1 more
doaj +1 more source
BackgroundCyber defense decision-making during cyber threat situations is based on human-to-human communication aiming to establish a shared cyber situational awareness.
Torvald F. Ask +12 more
doaj +1 more source
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION
In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security.
Miftah Farid, Ajeng Ayu Adhisty
doaj +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
Current threat models typically consider all possible ways an attacker can penetrate a system and assign probabilities to each path according to some metric (e.g. time-to-compromise).
Allodi, Luca, Etalle, Sandro
core +2 more sources

