Leveraging data analytics to revolutionize cybersecurity with machine learning and deep learning [PDF]
The exponential growth of digital technologies has brought about a surge in the complexity and frequency of cyber-attacks, necessitating robust cyber security measures.
Asadi Srinivasulu +4 more
doaj +2 more sources
Power-supply enterprises cyber security and IT-immunity in the Customs Union countries [PDF]
It is important for power supply firms to remain immune to rapidly emerging cybersecurity threats. These can be acts of a hooligan nature, and an attempt to steal data and money, and even cases of electronic terrorism.
Pletnev Dmitri +3 more
doaj +1 more source
Quantifying the econometric loss of a cyber-physical attack on a seaport
Modern Cyber-Physical Systems (CPS) show increasing levels of automation, intelligence, and optimization capabilities. Both creators and adopters of these technologies emphasize the benefits: safety, cost-savings, and efficiencies.
Kimberly Tam +4 more
doaj +1 more source
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]
Accepted paper at ICDE ...
Gao, Peng +8 more
openaire +2 more sources
Cyber Threats Classifications and Countermeasures in Banking and Financial Sector
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex and ...
Abdulbasit A. Darem +5 more
doaj +1 more source
Developing cyber defense strategies against future enemy threats on the horizon of 1405 [PDF]
Cyber threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid ...
Mohammad Sepehri
doaj +1 more source
Dynamic Assessment of Cyber Threats in the Field of Insurance
The area of digital technologies is currently the subject of many cyber threats, the frequency of which is increasing. One of the areas of cyber security is also the creation of models and estimates of the process of cyber threats and their possible ...
Lukáš Pavlík, Martin Ficek, Jakub Rak
doaj +1 more source
Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core +3 more sources
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj +1 more source
Analysis of presidential regulations concerning cyber security to bolster defense policy management
As a developing country, Indonesia must effectively manage its national defense by implementing defense policies which can be interpreted as management activities that transform into defense policy management entities.
Rizky Ramadhianto +3 more
doaj +1 more source

