Results 61 to 70 of about 137,074 (286)

Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database

open access: yesIEEE Access
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for ...
Bader Al-Sada   +2 more
doaj   +1 more source

Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions

open access: yesPolicy Perspectives, 2018
The 20 th century was overshadowed by conventional military threats, whereas the 21 st century has witnessed the preeminence of non-conventional security threats, including terrorism, transnational crime, civil wars, environmental degeneration and ...
Dr. Muhammad Riaz Shad
doaj   +1 more source

Cyber Threats Classifications and Countermeasures in Banking and Financial Sector

open access: yesIEEE Access, 2023
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex and ...
Abdulbasit A. Darem   +5 more
doaj   +1 more source

Cyber Threat Intelligence Platform [PDF]

open access: yes, 2016
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core  

Pervasive eHealth services a security and privacy risk awareness survey [PDF]

open access: yes, 2016
The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms.
Bellekens, Xavier   +5 more
core   +3 more sources

A Scoping Review and Bibliometric Analysis on Smart Firefighting in Buildings and Infrastructures

open access: yesFire and Materials, EarlyView.
ABSTRACT Smart Firefighting is a concept that has emerged within the fire engineering and fire science disciplines in recent years. It can enable informed decision making and improved fire safety. However, its scope, definition, outcomes, and value to emergency management remain unclear. To investigate this, a scoping review and a bibliometric analysis
José Antonio Morales Mere   +2 more
wiley   +1 more source

Transforming healthcare with large language models: Current applications, challenges, and future directions—a literature review

open access: yesJournal of Intelligent Medicine, EarlyView.
Abstract AI‐based large language models (LLMs) have gradually made their way into various fields, transforming industries and changing the way we solve problems. LLMs have great potential in healthcare, where they can share the burden of data management, retrieval, and decision‐making.
Muhammad Umar   +11 more
wiley   +1 more source

Exploring the motivation behind cybersecurity insider threat and proposed research agenda [PDF]

open access: yes, 2016
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of the most significant cyber security threat vector, while posing a great concern to corporations and governments.
Clarke, Karla   +2 more
core  

Technostress and Technophobia: Unmasking the Impact of Coerced AI Adoption in Higher Education Institutions

open access: yesGlobal Business and Organizational Excellence, EarlyView.
ABSTRACT This article investigates the impact of coerced AI adoption on the psychological well‐being of academic staff within higher education institutions. Data were collected from a sample of 470 faculty members randomly selected from higher education institutions in Pakistan.
Muhammad Imran Qureshi   +3 more
wiley   +1 more source

Cyber security and cyber threats

open access: yes, 2023
The article examines the impact of cybersecurity in the digital space on the international economy. The classification today, yesterday, and in the future and analysis of cyber threats are carried out. The practical significance of the research results is obvious, since the active spread of IT technologies and their application in many areas of human ...
Gnediuc, I.O., Ohrimenco, S.A.
openaire   +1 more source

Home - About - Disclaimer - Privacy