Results 41 to 50 of about 79,970 (188)
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction
Scientific work that leverages information about communities on the deep and dark web has opened up new angles in the field of security informatics. [...]
Paulo Shakarian
doaj +1 more source
Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H. +2 more
core +1 more source
SmartSentry: Cyber Threat Intelligence in Industrial IoT
While the Internet of Things (IoT) paradigm has transformed connectivity, it has also brought with it previously unheard-of security risks. The categorization of IoT attacks using several machine learning techniques and a deep learning method is the main
Sapna Sadhwani +3 more
doaj +1 more source
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc.
brauer +5 more
core +1 more source
Improving Forensic Triage Efficiency through Cyber Threat Intelligence
The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information ...
Nikolaos Serketzis +4 more
doaj +1 more source
Predicting Cyber Events by Leveraging Hacker Sentiment
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok +2 more
core +1 more source
Human Trafficking and Terrorism: Utilizing National Security Resources to Prevent Human Trafficking in the Islamic State [PDF]
This is a report of a Master’s thesis done in behalf of the local network in Stockholm, under Fortum Distribution AB. The thesis was to conduct a review of a distribution station named Fs Myrängen located in Täby.
Welch, Shannon A.
core +2 more sources
"Virtual disenfranchisement": cyber election meddling in the grey zones of international law [PDF]
This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a ...
Schmitt, Michael
core +2 more sources
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc.
Farooq, Muhammad Junaid, Zhu, Quanyan
core +1 more source

