Results 21 to 30 of about 140,490 (288)
Cyberthreats on Implantable Medical Devices
The significant and rapid technological development in the field of medical care, and Implanted Medical Device, clearly lead to improve the quality of care and effectiveness of treatment for numerous diseases that were previously difficult to be ...
Mohammed N. A. Sabra
doaj +1 more source
Proactive threat detection for connected cars using recursive Bayesian estimation [PDF]
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber ...
al-Khateeb, Haider +4 more
core +3 more sources
Possibilities of modelling the impact of cyber threats in cyber risk insurance
In the last few years, we could see that a lot of world organizations are contested by different ways, which we are called as cyber threats or cyber risks.
Pavlik Lukas
doaj +1 more source
The high-speed development of Fifth Generation technologies announces a new era for the internet of things (IoT), distinguished by high-rate connectivity, speed, and low latency.
Umed H. Jader +2 more
doaj +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise ...
Michele Kielty, A. Renee Staton
doaj
Actual and future digital threats and their impact on civil and military cybersecurity management
Objectives (1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4)
Oriana Helena Negulescu +2 more
doaj +1 more source
Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy ...
Frye, Jason Neal +6 more
openaire +2 more sources
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries.
openaire +1 more source

