Cyber Threats Classifications and Countermeasures in Banking and Financial Sector
The banking and financial sector has always been a prime target for cyber threats due to the critical nature of the information they handle. With the increasing dependence on technology and digital transformation, the sector is facing more complex and ...
Abdulbasit A. Darem +5 more
doaj +3 more sources
A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem [PDF]
Stefano Silvestri +2 more
exaly +2 more sources
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]
Accepted paper at ICDE ...
Peng Gao 0008 +8 more
openaire +2 more sources
Power-supply enterprises cyber security and IT-immunity in the Customs Union countries [PDF]
It is important for power supply firms to remain immune to rapidly emerging cybersecurity threats. These can be acts of a hooligan nature, and an attempt to steal data and money, and even cases of electronic terrorism.
Pletnev Dmitri +3 more
doaj +1 more source
Quantifying the econometric loss of a cyber-physical attack on a seaport
Modern Cyber-Physical Systems (CPS) show increasing levels of automation, intelligence, and optimization capabilities. Both creators and adopters of these technologies emphasize the benefits: safety, cost-savings, and efficiencies.
Kimberly Tam +4 more
doaj +1 more source
Developing cyber defense strategies against future enemy threats on the horizon of 1405 [PDF]
Cyber threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid ...
Mohammad Sepehri
doaj +1 more source
Dynamic Assessment of Cyber Threats in the Field of Insurance
The area of digital technologies is currently the subject of many cyber threats, the frequency of which is increasing. One of the areas of cyber security is also the creation of models and estimates of the process of cyber threats and their possible ...
Lukáš Pavlík, Martin Ficek, Jakub Rak
doaj +1 more source
A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things [PDF]
Pandian Alagappan
exaly +2 more sources
Governing cyber security through networks : an analysis of cyber security coordination in Belgium [PDF]
While governments develop formal and informal structures or 'networks' to promote collaboration between governmental departments and agencies, there remains uncertainty on how to set up and develop cyber security networks. The latter is demonstrated when
Rondelez, Rafaël
core +3 more sources
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj +1 more source

