Results 71 to 80 of about 79,970 (188)
Cyber security: State of the art, challenges and future directions
Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every
Wasyihun Sema Admass +2 more
doaj +1 more source
The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core +1 more source
This work explores the integration and effectiveness of artificial intelligence in improving the security of critical energy infrastructure, highlighting its potential to transform cybersecurity practices in the sector.
Jaime Govea +2 more
doaj +1 more source
Developing a Cybersecurity Training Environment through the Integration of OpenAI and AWS
Cybersecurity is a critical concern in today’s digital age, where organizations face an ever-evolving cyber threat landscape. This study explores the potential of leveraging artificial intelligence and Amazon Web Services to improve cybersecurity ...
William Villegas-Ch +2 more
doaj +1 more source
Cyber Guardian : Intelligent Threat Surveillance
Advanced persistent threats (APTs) are cyberattacking that use covert strategies to target specific groups. As a result of the rapid growth of computing technology and the widespread connectivity of devices, there has been a boom in data transfer across networks. Because APTs' attack tactics are always changing, it can be difficult to detect them. This
null Aditi. H. R. +2 more
openaire +1 more source
Standards-based Cyber Threat Intelligence sharing using private Blockchains [PDF]
Kimon-Antonios Provatas +2 more
doaj +1 more source
Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing
Sharing cyber threat intelligence (CTI) can significantly improve the security of information technology (IT) in organizations. However, stakeholders and practitioners are not keen on sharing CTI data due to the risk of exposing their private data and ...
Algimantas Venčkauskas +3 more
doaj +1 more source
National plan to combat cybercrime [PDF]
Australia is a highly connected country - technology and the internet are crucial to Australia\u27s way of life. However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging
core
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for ...
Bader Al-Sada +2 more
doaj +1 more source
A GPT-Based Approach for Cyber Threat Assessment
Background: The increasing prevalence of cyber threats in industrial cyber–physical systems (ICPSs) necessitates advanced solutions for threat detection and analysis.
Fahim Sufi
doaj +1 more source

