Results 31 to 40 of about 139,452 (290)

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

open access: yesJournal of Cybersecurity and Privacy
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and ...
Habib El Amin   +4 more
doaj   +1 more source

Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure [PDF]

open access: yesJournal of Universal Computer Science, 2019
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security ...
Halima Kure, Shareeful Islam
doaj   +3 more sources

Unifying Cyber Threat Intelligence [PDF]

open access: yes, 2019
The threat landscape and the associated number of IT security incidents are constantly increasing. In order to address this problem, a trend towards cooperative approaches and the exchange of information on security incidents has been developing over recent years. Today, several different data formats with varying properties are available that allow to
Menges, Florian   +2 more
openaire   +2 more sources

Toward Environmentally Friendly Hydrogel‐Based Flexible Intelligent Sensor Systems

open access: yesAdvanced Intelligent Discovery, EarlyView.
This review summarizes environmentally and biologically friendly hydrogel‐based flexible sensor systems focusing on physical, chemical, and physiological sensors. Furthermore, device concepts moving forward for the practical application are discussed about wireless integration, the interface between hydrogel and dry electronics, automatic data analysis
Sudipta Kumar Sarkar, Kuniharu Takei
wiley   +1 more source

The Influence of South Africa’s Democratic Principles on its Cybersecurity Framework and Cyber Threat Response

open access: yesJournal of BRICS Studies
This study explores the intricate relationship between South Africa's democratic political system, its commitment to human and private rights, and the development of its cybersecurity framework, strategy, and response to cyber threats. Given the country'
Venencia Paidamoyo Nyambuya   +1 more
doaj   +1 more source

A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness

open access: yesFrontiers in Big Data, 2023
BackgroundCyber defense decision-making during cyber threat situations is based on human-to-human communication aiming to establish a shared cyber situational awareness.
Torvald F. Ask   +12 more
doaj   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION

open access: yesJurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity, 2019
In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security.
Miftah Farid, Ajeng Ayu Adhisty
doaj   +1 more source

Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]

open access: yes, 2015
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M   +12 more
core  

Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions

open access: yes, 2017
Current threat models typically consider all possible ways an attacker can penetrate a system and assign probabilities to each path according to some metric (e.g. time-to-compromise).
Allodi, Luca, Etalle, Sandro
core   +2 more sources

Home - About - Disclaimer - Privacy