Results 41 to 50 of about 79,970 (188)

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction

open access: yesInformation, 2018
Scientific work that leverages information about communities on the deep and dark web has opened up new angles in the field of security informatics. [...]
Paulo Shakarian
doaj   +1 more source

Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]

open access: yes, 2019
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H.   +2 more
core   +1 more source

SmartSentry: Cyber Threat Intelligence in Industrial IoT

open access: yesIEEE Access
While the Internet of Things (IoT) paradigm has transformed connectivity, it has also brought with it previously unheard-of security risks. The categorization of IoT attacks using several machine learning techniques and a deep learning method is the main
Sapna Sadhwani   +3 more
doaj   +1 more source

Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)

open access: yes, 2017
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc.
brauer   +5 more
core   +1 more source

Improving Forensic Triage Efficiency through Cyber Threat Intelligence

open access: yesFuture Internet, 2019
The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information ...
Nikolaos Serketzis   +4 more
doaj   +1 more source

Predicting Cyber Events by Leveraging Hacker Sentiment

open access: yes, 2018
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok   +2 more
core   +1 more source

Human Trafficking and Terrorism: Utilizing National Security Resources to Prevent Human Trafficking in the Islamic State [PDF]

open access: yes, 2014
This is a report of a Master’s thesis done in behalf of the local network in Stockholm, under Fortum Distribution AB. The thesis was to conduct a review of a distribution station named Fs Myrängen located in Täby.
Welch, Shannon A.
core   +2 more sources

"Virtual disenfranchisement": cyber election meddling in the grey zones of international law [PDF]

open access: yes, 2018
This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a ...
Schmitt, Michael
core   +2 more sources

On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)

open access: yes, 2018
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc.
Farooq, Muhammad Junaid, Zhu, Quanyan
core   +1 more source

Home - About - Disclaimer - Privacy