Results 61 to 70 of about 150,359 (291)
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence
In today's dynamic cybersecurity landscape, timely and accurate threat intelligence is essential for proactive defense. This study explores the potential of social media platforms as a valuable resource for extracting actionable Indicators of Compromise (IoCs).
Arikkat, Dincy R +5 more
openaire +2 more sources
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H. +2 more
core +1 more source
A Scoping Review and Bibliometric Analysis on Smart Firefighting in Buildings and Infrastructures
ABSTRACT Smart Firefighting is a concept that has emerged within the fire engineering and fire science disciplines in recent years. It can enable informed decision making and improved fire safety. However, its scope, definition, outcomes, and value to emergency management remain unclear. To investigate this, a scoping review and a bibliometric analysis
José Antonio Morales Mere +2 more
wiley +1 more source
Human Trafficking and Terrorism: Utilizing National Security Resources to Prevent Human Trafficking in the Islamic State [PDF]
This is a report of a Master’s thesis done in behalf of the local network in Stockholm, under Fortum Distribution AB. The thesis was to conduct a review of a distribution station named Fs Myrängen located in Täby.
Welch, Shannon A.
core +2 more sources
Dark-Web Cyber Threat Intelligence: From Data to Intelligence to Prediction
Scientific work that leverages information about communities on the deep and dark web has opened up new angles in the field of security informatics. [...]
Paulo Shakarian
doaj +1 more source
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc.
brauer +5 more
core +1 more source
As today’s cybersecurity environment is becoming increasingly complex, it is crucial to analyse threats quickly and effectively. A delayed response or lack of foresight can lead to data loss, reputational damage, and operational disruptions.
Doygun Demirol, Resul Daş, Davut Hanbay
semanticscholar +1 more source
Abstract AI‐based large language models (LLMs) have gradually made their way into various fields, transforming industries and changing the way we solve problems. LLMs have great potential in healthcare, where they can share the burden of data management, retrieval, and decision‐making.
Muhammad Umar +11 more
wiley +1 more source

