Results 1 to 10 of about 139,286 (190)

Leveraging data analytics to revolutionize cybersecurity with machine learning and deep learning [PDF]

open access: yesScientific Reports
The exponential growth of digital technologies has brought about a surge in the complexity and frequency of cyber-attacks, necessitating robust cyber security measures.
Asadi Srinivasulu   +4 more
doaj   +2 more sources

Power-supply enterprises cyber security and IT-immunity in the Customs Union countries [PDF]

open access: yesE3S Web of Conferences, 2023
It is important for power supply firms to remain immune to rapidly emerging cybersecurity threats. These can be acts of a hooligan nature, and an attempt to steal data and money, and even cases of electronic terrorism.
Pletnev Dmitri   +3 more
doaj   +1 more source

Quantifying the econometric loss of a cyber-physical attack on a seaport

open access: yesFrontiers in Computer Science, 2023
Modern Cyber-Physical Systems (CPS) show increasing levels of automation, intelligence, and optimization capabilities. Both creators and adopters of these technologies emphasize the benefits: safety, cost-savings, and efficiencies.
Kimberly Tam   +4 more
doaj   +1 more source

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]

open access: yes2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021
Accepted paper at ICDE ...
Gao, Peng   +8 more
openaire   +2 more sources

Cyber Threats Classifications and Countermeasures in Banking and Financial Sector

open access: yesIEEE Access, 2023
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex and ...
Abdulbasit A. Darem   +5 more
doaj   +1 more source

Developing cyber defense strategies against future enemy threats on the horizon of 1405 [PDF]

open access: yesآینده‌پژوهی دفاعی, 2022
Cyber ​​threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid ...
Mohammad Sepehri
doaj   +1 more source

Dynamic Assessment of Cyber Threats in the Field of Insurance

open access: yesRisks, 2022
The area of digital technologies is currently the subject of many cyber threats, the frequency of which is increasing. One of the areas of cyber security is also the creation of models and estimates of the process of cyber threats and their possible ...
Lukáš Pavlík, Martin Ficek, Jakub Rak
doaj   +1 more source

Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]

open access: yes, 2015
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core   +3 more sources

Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques

open access: yesCybernetics and Information Technologies, 2022
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj   +1 more source

Analysis of presidential regulations concerning cyber security to bolster defense policy management

open access: yesDefense and Security Studies, 2023
As a developing country, Indonesia must effectively manage its national defense by implementing defense policies which can be interpreted as management activities that transform into defense policy management entities.
Rizky Ramadhianto   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy