Results 251 to 260 of about 1,175,680 (325)

Swarm-based intelligent models for developing cybersecurity frameworks with IDS. [PDF]

open access: yesSci Rep
Kumar NS   +5 more
europepmc   +1 more source

Cyber Threats and Exploring the Sources of Cyber Threat Intelligence

open access: yesProceedings of the International Conference on Cybersecurity and Cybercrime (IC3)
Cyber threat intelligence technology becomes a necessity in the context of the exponential evolution of information systems. The methods used by malicious actors are constantly evolving, becoming more and more sophisticated over time, thus making the task of security teams more difficult.
Adelaida STĂNCIULESCU   +2 more
openaire   +2 more sources

NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems

IEEE Transactions on Industrial Informatics, 2023
Honeypots have proven to be an effective defense method for industrial control systems (ICSs). However, as attacker skills become more sophisticated, it becomes increasingly difficult to develop honeypots that can effectively recognize and respond to ...
Yao Shan, Yu Yao, Tong Zhao, Wei Yang
semanticscholar   +1 more source

Cyber Threats and Nuclear Security in India

Journal of Asian Security and International Affairs, 2022
State and non-state actors are increasingly using cyberspace as a platform to execute hybrid warfare. As multiple incidents in India have shown critical infrastructures, particularly nuclear infrastructures, have been lucrative targets of cyber-attacks ...
B. Poornima
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy