Results 81 to 90 of about 150,359 (291)

Improving Forensic Triage Efficiency through Cyber Threat Intelligence

open access: yesFuture Internet, 2019
The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information ...
Nikolaos Serketzis   +4 more
doaj   +1 more source

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

Predicting Cyber Events by Leveraging Hacker Sentiment

open access: yes, 2018
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok   +2 more
core   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World

open access: yesIEEE Access
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee   +2 more
doaj   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)

open access: yes, 2018
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc.
Farooq, Muhammad Junaid, Zhu, Quanyan
core   +1 more source

Using cyber threat intelligence in SDN security

open access: yes2017 International Conference on Computer Science and Engineering (UBMK), 2017
As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks.
Yurekten, Ozgur, Demirci, Mehmet
openaire   +3 more sources

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

Enhanced threat intelligence framework for advanced cybersecurity resilience

open access: yesEgyptian Informatics Journal
The increasing severity of cyber-attacks against organizations emphasizes the necessity for efficient threat intelligence. This article presents a novel multi-layered architecture for threat intelligence that integrates diverse data streams, including ...
Moutaz Alazab   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy