Artificial intelligence in the cyber domain: Offense and defense [PDF]
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao +2 more
core +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Forensic and technical criminalistics support in cybercrime investigation
The issue of cyber security has become a key State objective in Ukraine. Cyber espionage and cyber-attacks by intelligence agencies (predominantly non-democratic countries) have become the most significant modern threat to automated systems, surpassing ...
Andrii Padalka
doaj +1 more source
Serious, therefore organised? A critique of the emerging "cyber-organised crime" rhetoric in the United Kingdom [PDF]
This paper, based on discourse analysis of policy documents, departs from a critique of the juxtaposition of the terms "serious" and "organised" in policies against organised crime in the UK.
Lavorgna, A, Sergi, A
core +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all ...
Jian-hua LI
doaj +3 more sources
Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation.
Konstantinos Rantos +5 more
doaj +1 more source
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy
Today’s threats use multiple means of propagation, such as social engineering, email, and application vulnerabilities, and often operate in different phases, such as single device compromise, lateral network movement, and data exfiltration. These complex
Cláudio Martins, Ibéria Medeiros
semanticscholar +1 more source
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina +4 more
wiley +1 more source
Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core +3 more sources

