Results 71 to 80 of about 79,970 (188)

Cyber security: State of the art, challenges and future directions

open access: yesCyber Security and Applications
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every
Wasyihun Sema Admass   +2 more
doaj   +1 more source

The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]

open access: yes, 2012
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core   +1 more source

Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence

open access: yesSystems
This work explores the integration and effectiveness of artificial intelligence in improving the security of critical energy infrastructure, highlighting its potential to transform cybersecurity practices in the sector.
Jaime Govea   +2 more
doaj   +1 more source

Developing a Cybersecurity Training Environment through the Integration of OpenAI and AWS

open access: yesApplied Sciences
Cybersecurity is a critical concern in today’s digital age, where organizations face an ever-evolving cyber threat landscape. This study explores the potential of leveraging artificial intelligence and Amazon Web Services to improve cybersecurity ...
William Villegas-Ch   +2 more
doaj   +1 more source

Cyber Guardian : Intelligent Threat Surveillance

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology
Advanced persistent threats (APTs) are cyberattacking that use covert strategies to target specific groups. As a result of the rapid growth of computing technology and the widespread connectivity of devices, there has been a boom in data transfer across networks. Because APTs' attack tactics are always changing, it can be difficult to detect them. This
null Aditi. H. R.   +2 more
openaire   +1 more source

Standards-based Cyber Threat Intelligence sharing using private Blockchains [PDF]

open access: yesAnnals of computer science and information systems, 2023
Kimon-Antonios Provatas   +2 more
doaj   +1 more source

Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing

open access: yesApplied Sciences
Sharing cyber threat intelligence (CTI) can significantly improve the security of information technology (IT) in organizations. However, stakeholders and practitioners are not keen on sharing CTI data due to the risk of exposing their private data and ...
Algimantas Venčkauskas   +3 more
doaj   +1 more source

National plan to combat cybercrime [PDF]

open access: yes
Australia is a highly connected country - technology and the internet are crucial to Australia\u27s way of life. However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging

core  

Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database

open access: yesIEEE Access
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for ...
Bader Al-Sada   +2 more
doaj   +1 more source

A GPT-Based Approach for Cyber Threat Assessment

open access: yesAI
Background: The increasing prevalence of cyber threats in industrial cyber–physical systems (ICPSs) necessitates advanced solutions for threat detection and analysis.
Fahim Sufi
doaj   +1 more source

Home - About - Disclaimer - Privacy