Results 91 to 100 of about 142,803 (291)
Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems
Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing ...
Bonomi, Silvia +4 more
core +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Strategy of the higher educations of Ukraine in training of experts on informational and cyber security [PDF]
In October 2017 the European Council again called the attention and assigned the task to enhance the cyber security actions within EU countries. The provided regulations underline the necessity in joint actions to combat cybercrimes.
Borsukovska, Viktoriia +2 more
core
Systems‐Based Organisational Resilience Framework: A Delphi Study‐Based Validation and Verification
ABSTRACT The increasing systemic complexity of the Fourth Industrial Revolution has heightened the need for robust approaches to organisational resilience. Despite its growing prominence, resilience research remains fragmented, with limited consensus on core dimensions, causal interdependencies and mechanisms suitable for dynamic assessment. This study
Dumisani Manzini +3 more
wiley +1 more source
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
Formation of the TNI Cyber Force: A Strategic and Policy Analysis
The increasing cyber threats in Indonesia require strengthening the country's defense strategy. This study focuses on the formation of the Indonesian National Army (TNI) Cyber Force as part of efforts to strengthen the country's cyber security in facing
Aris Sarjito
doaj +1 more source
ABSTRACT Digital Engineering (DE) transformation represents a paradigm shift in systems engineering (SE), aiming to integrate heterogeneous analytical models and digital artifacts into an authoritative source of truth to improve traceability and lifecycle management.
Md Doulotuzzaman Xames, Taylan G. Topcu
wiley +1 more source
How Cyber-Resilient Are Unmanned Aircraft Systems? A Systematic Meta-Review
Unmanned Aircraft Systems (UASs) offer a promising future for aviation operations, even though it suffers larger cyber-related challenges. As such, cyber-resilience becomes a core property for drones’ operations.
Andrea Montaruli +2 more
doaj +1 more source
Automating Attack and Defense Strategies in Cybersecurity [PDF]
Given the ongoing development and variety of cyber threats, there is a growing urgency for a proactive and efficient approach to IT security. This article presents a novel approach to automating cyber security attack and defense techniques by using ...
Ionut LATES, Catalin BOJA
doaj +1 more source
Countering Autonomous Cyber Threats
With the capability to write convincing and fluent natural language and generate code, Foundation Models present dual-use concerns broadly and within the cyber domain specifically. Generative AI has already begun to impact cyberspace through a broad illicit marketplace for assisting malware development and social engineering attacks through hundreds of
Kade M. Heckel, Adrian Weller
openaire +2 more sources

