Results 11 to 20 of about 142,803 (291)

Hybrid nature of modern threats for cybersecurity and information security

open access: yesSmart Cities and Regional Development Journal, 2020
The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the emerging paradigm.
Oleksandr TSARUK, Maria KORNIIETS
doaj   +1 more source

Analysis of presidential regulations concerning cyber security to bolster defense policy management

open access: yesDefense and Security Studies, 2023
As a developing country, Indonesia must effectively manage its national defense by implementing defense policies which can be interpreted as management activities that transform into defense policy management entities.
Rizky Ramadhianto   +3 more
doaj   +1 more source

Challenges and Threats of the Digital Economy to the Sustainability of the National Banking System

open access: yesФинансы: теория и практика, 2022
The goal of the study – development of specific methodical reasoned proposals on improvement of the mechanism for ensuring sustainable development of the national banking system and its security against external challenges and threats to cyberspace.
M. N. Dudin, S. V. Shkodinsky
doaj   +1 more source

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

Threat Trekker: An Approach to Cyber Threat Hunting

open access: yesCoRR, 2023
I am disseminating this outcome to all of you, despite the fact that the results may appear somewhat idealistic, given that certain datasets utilized for the training of the machine learning model comprise simulated ...
Ángel Casanova Bienzobas   +1 more
openaire   +2 more sources

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]

open access: yes, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core   +3 more sources

The Sounds of Cyber Threats

open access: yesCoRR, 2018
The Internet enables users to access vast resources, but it can also expose users to harmful cyber-attacks. This paper investigates human factors issues concerning the use of sounds in a cyber-security domain. It describes a methodology, referred to as sonification, to effectively design and develop auditory cyber-security threat indicators to warn ...
Akbar Siami Namin   +3 more
openaire   +2 more sources

Modeling scenarios of extreme situations in the energy sector caused by cyber threats [PDF]

open access: yesE3S Web of Conferences, 2021
The paper considers the violation of cybersecurity as a possibility of a real impact (intentional or accidental) from cyberspace on the physical infrastructure of a digital energy facility.
Gaskova Daria A., Massel Aleksei G.
doaj   +1 more source

European security strategy and cyber threats: Importance for Serbia [PDF]

open access: yesВојно дело, 2015
Cyber threats are among the greatest threats in modern conflicts, because relatively small forces and so-called unknown attackers may inflict huge losses to the more powerful, especially in the field of the information technology use.
Nedeljković Slobodan, Forca Božidar
doaj   +1 more source

Evidential Cyber Threat Hunting

open access: yesCoRR, 2021
A formal cyber reasoning framework for automating the threat hunting process is described. The new cyber reasoning methodology introduces an operational semantics that operates over three subspaces -- knowledge, hypothesis, and action -- to enable human-machine co-creation of threat hypotheses and protective recommendations.
Frederico Araujo   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy