AAPM working group on cybersecurity report 438: A white paper on cybersecurity management for business continuity in radiology and radiation therapy. [PDF]
Abstract A growing number of clinics have experienced disruptions of clinical services due to cyberattacks. To provide continuity of care, medical physicists should work with Information Technology (IT) staff to develop a business continuity plan.
Siochi RA +7 more
europepmc +2 more sources
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure [PDF]
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security ...
Halima Kure, Shareeful Islam
doaj +3 more sources
Measuring and visualizing cyber threat intelligence quality [PDF]
The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of ...
Böhm, Fabian +3 more
core +1 more source
Computer crime motives: Do we have it right?
Abstract Academic, legal and practitioner responses to cyber threats have been predominantly reactive, punitive, and deterrence‐based, with limited attention given to the motives underlying computer criminals' behaviors. This paper reasons that new and better theoretical perspectives are needed to explain computer criminals' motives. Following a review
Derrick Neufeld
wiley +1 more source
Blockchain‐Based Cyber Threat Intelligence Sharing Using Proof‐of‐Quality Consensus
Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is collected, processed, analysed, and disseminated to the right audience, in order to comprehend a malicious threat actor’s motivation, goals, objectives, targets, and attack behaviours.
Dimitrios Chatziamanetoglou +2 more
wiley +1 more source
Cyber threat attribution using unstructured reports in cyber threat intelligence
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj +1 more source
SecTKG: A Knowledge Graph for Open‐Source Security Tools
As the complexity of cyberattacks continues to increase, multistage combination attacks have become the primary method of attack. Attackers plan and organize a series of attack steps, using various attack tools to achieve specific goals. Extracting knowledge about these tools is of great significance for both defense and tracing of attacks.
Siqi Sun +4 more
wiley +1 more source
Intelligent protection coordination restoration strategy for active distribution networks
Abstract Despite various advantages of integrating distributed generation (DG) units into distribution networks such as power loss reduction and voltage profile improvement, they may disrupt the performance of the conventional protection system due to bidirectional power flow and change of short‐circuit power.
Mahmoud Hojjaty +2 more
wiley +1 more source
Detection and Blockchain‐Based Collaborative Mitigation of Internet of Things Botnets
DDoS (distributed denial of service) attacks have drastically effected the functioning of Internet‐based services in recent years. Following the release of the Mirai botnet source code on GitHub, the scope of these exploitations has grown. The attackers have been able to construct and launch variations of the Mirai botnet thanks to the open‐sourcing of
Syed Muhammad Sajjad +9 more
wiley +1 more source
Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix
In the past, phishing techniques were a common means of attack carried out by individuals or small groups via spam mail on a randomly selected target. However, in recent years, phishing techniques have been adopted by advanced persistent threat (APT) groups to attack organizations such as the Sony Pictures Enterprise and Korea Hydro & Nuclear Power. As
Youngsup Shin +4 more
wiley +1 more source

