Results 1 to 10 of about 142,803 (291)

Cyber Threats Classifications and Countermeasures in Banking and Financial Sector

open access: yesIEEE Access, 2023
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex and ...
Abdulbasit A. Darem   +5 more
doaj   +3 more sources

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]

open access: yes2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021
Accepted paper at ICDE ...
Peng Gao 0008   +8 more
openaire   +2 more sources

Power-supply enterprises cyber security and IT-immunity in the Customs Union countries [PDF]

open access: yesE3S Web of Conferences, 2023
It is important for power supply firms to remain immune to rapidly emerging cybersecurity threats. These can be acts of a hooligan nature, and an attempt to steal data and money, and even cases of electronic terrorism.
Pletnev Dmitri   +3 more
doaj   +1 more source

Quantifying the econometric loss of a cyber-physical attack on a seaport

open access: yesFrontiers in Computer Science, 2023
Modern Cyber-Physical Systems (CPS) show increasing levels of automation, intelligence, and optimization capabilities. Both creators and adopters of these technologies emphasize the benefits: safety, cost-savings, and efficiencies.
Kimberly Tam   +4 more
doaj   +1 more source

Developing cyber defense strategies against future enemy threats on the horizon of 1405 [PDF]

open access: yesآینده‌پژوهی دفاعی, 2022
Cyber ​​threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid ...
Mohammad Sepehri
doaj   +1 more source

Dynamic Assessment of Cyber Threats in the Field of Insurance

open access: yesRisks, 2022
The area of digital technologies is currently the subject of many cyber threats, the frequency of which is increasing. One of the areas of cyber security is also the creation of models and estimates of the process of cyber threats and their possible ...
Lukáš Pavlík, Martin Ficek, Jakub Rak
doaj   +1 more source

Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]

open access: yes, 2015
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core   +3 more sources

Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques

open access: yesCybernetics and Information Technologies, 2022
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj   +1 more source

Home - About - Disclaimer - Privacy