Results 11 to 20 of about 140,490 (288)

Hybrid nature of modern threats for cybersecurity and information security

open access: yesSmart Cities and Regional Development Journal, 2020
The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the emerging paradigm.
Oleksandr TSARUK, Maria KORNIIETS
doaj   +1 more source

Challenges and Threats of the Digital Economy to the Sustainability of the National Banking System

open access: yesФинансы: теория и практика, 2022
The goal of the study – development of specific methodical reasoned proposals on improvement of the mechanism for ensuring sustainable development of the national banking system and its security against external challenges and threats to cyberspace.
M. N. Dudin, S. V. Shkodinsky
doaj   +1 more source

Modeling scenarios of extreme situations in the energy sector caused by cyber threats [PDF]

open access: yesE3S Web of Conferences, 2021
The paper considers the violation of cybersecurity as a possibility of a real impact (intentional or accidental) from cyberspace on the physical infrastructure of a digital energy facility.
Gaskova Daria A., Massel Aleksei G.
doaj   +1 more source

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]

open access: yes, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core   +3 more sources

European security strategy and cyber threats: Importance for Serbia [PDF]

open access: yesВојно дело, 2015
Cyber threats are among the greatest threats in modern conflicts, because relatively small forces and so-called unknown attackers may inflict huge losses to the more powerful, especially in the field of the information technology use.
Nedeljković Slobodan, Forca Božidar
doaj   +1 more source

Protecting Cyber Physical Systems Using a Learned MAPE-K Model

open access: yesIEEE Access, 2019
Industry 4.0 leverages on cyber-physical systems (CPSs) that enable different physical sensors, actuators, and controllers to be interconnected via switches and cloud computing servers, forming complex online systems.
Ibrahim Elgendi   +3 more
doaj   +1 more source

STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]

open access: yes, 2018
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique   +2 more
core   +1 more source

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Various types of cyber threats [PDF]

open access: yesSrpska Politička Misao
Security of the Internet and online communication has become an essential challenge in contemporary world. Paper discusses different types of cyber threats: cyber-attack, cyber terrorism and cybercrime.
Luknar Ivana, Jovanović Filip
doaj   +1 more source

Home - About - Disclaimer - Privacy