Results 21 to 30 of about 140,490 (288)

Cyberthreats on Implantable Medical Devices

open access: yesJournal of Information Security and Cybercrimes Research, 2021
The significant and rapid technological development in the field of medical care, and Implanted Medical Device, clearly lead to improve the quality of care and effectiveness of treatment for numerous diseases that were previously difficult to be ...
Mohammed N. A. Sabra
doaj   +1 more source

Proactive threat detection for connected cars using recursive Bayesian estimation [PDF]

open access: yes, 2017
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber ...
al-Khateeb, Haider   +4 more
core   +3 more sources

Possibilities of modelling the impact of cyber threats in cyber risk insurance

open access: yesMATEC Web of Conferences, 2018
In the last few years, we could see that a lot of world organizations are contested by different ways, which we are called as cyber threats or cyber risks.
Pavlik Lukas
doaj   +1 more source

Navigating Cyber Threats

open access: yesARO-The Scientific Journal of Koya University
The high-speed development of Fifth Generation technologies announces a new era for the internet of things (IoT), distinguished by high-rate connectivity, speed, and low latency.
Umed H. Jader   +2 more
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise ...
Michele Kielty, A. Renee Staton
doaj  

Actual and future digital threats and their impact on civil and military cybersecurity management

open access: yesDefence Science Review, 2022
Objectives (1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4)
Oriana Helena Negulescu   +2 more
doaj   +1 more source

Cyber Threat Metrics [PDF]

open access: yes, 2012
Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy ...
Frye, Jason Neal   +6 more
openaire   +2 more sources

Cyber Threat Hunting

open access: yesInternational Journal of Cognitive Informatics and Natural Intelligence, 2021
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries.
openaire   +1 more source

Home - About - Disclaimer - Privacy