Results 81 to 90 of about 80,725 (273)

Using cyber threat intelligence in SDN security

open access: yes2017 International Conference on Computer Science and Engineering (UBMK), 2017
As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks.
Yurekten, Ozgur, Demirci, Mehmet
openaire   +3 more sources

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

Digital Engineering Transformation as a Sociotechnical Challenge: Categorization of Barriers and Their Mapping to DoD's Policy Goals

open access: yesSystems Engineering, EarlyView.
ABSTRACT Digital Engineering (DE) transformation represents a paradigm shift in systems engineering (SE), aiming to integrate heterogeneous analytical models and digital artifacts into an authoritative source of truth to improve traceability and lifecycle management.
Md Doulotuzzaman Xames, Taylan G. Topcu
wiley   +1 more source

Predicting Cyber Events by Leveraging Hacker Sentiment

open access: yes, 2018
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok   +2 more
core   +1 more source

Maximizing the Economic, Environmental, and Social Impact of the Metaverse

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The metaverse is a transformative digital ecosystem with the potential to redefine economic, environmental, and social systems. This qualitative study examines how the metaverse and its enabling technologies—such as AR/VR, blockchain, and AI—might evolve to influence sustainability. Drawing on semi‐structured interviews with global experts and
Alessandro Lanteri   +2 more
wiley   +1 more source

LLM-powered threat intelligence: a retrieval-augmented generation approach for cyber attack investigation [PDF]

open access: yesPeerJ Computer Science
Threat intelligence involves collecting, analyzing, and disseminating information about cyber threats to help organizations proactively defend against attacks.
Abeer Alhuzali
doaj   +2 more sources

Investigating SME‐Inclusive Public‐Private AI Innovation Network: Evidence From U.S. Small Business Administration (1991–2023)

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT Understanding innovation policy is pivotal to enhancing national competitiveness for global value chain. This research investigates an SME‐Inclusive public‐private AI innovation network over time in the U.S. context (1991–2023), revealing how a government's demand‐based innovation policy bolsters technological prowess through isomorphism and ...
Jiyoon An
wiley   +1 more source

A New Perspective and Model Proposal for Cyber Threat Intelligence after Pager Attacks

open access: yesGüvenlik Stratejileri Dergisi
This study explores the September 2024 pager attacks on Hezbollah as a case study to propose an expanded model for Cyber Threat Intelligence (CTI) within the framework of hybrid warfare.
Tuncay Doğantuna, Onur Ceran
doaj   +1 more source

NLP-based techniques for Cyber Threat Intelligence

open access: yesComputer Science Review
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior.
Marco Arazzi   +6 more
openaire   +2 more sources

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Home - About - Disclaimer - Privacy