Results 31 to 40 of about 1,175,680 (325)

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]

open access: yes, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core   +3 more sources

Cyberattacks, cyber threats, and attitudes toward cybersecurity policies

open access: yesJournal of Cybersecurity, 2021
Does exposure to cyberattacks influence public support for intrusive cybersecurity policies? How do perceptions of cyber threats mediate this relationship?
Keren L. G. Snider   +3 more
semanticscholar   +1 more source

The Missing Case of Disinformation from the Cybersecurity Risk Continuum: A Comparative Assessment of Disinformation with Other Cyber Threats

open access: yesInternational Conference on Data Technologies and Applications, 2022
This study examines the phenomenon of disinformation as a threat in the realm of cybersecurity. We have analyzed multiple authoritative cybersecurity standards, manuals, handbooks, and literary works. We present the unanimous meaning and construct of the
Kevin Matthe Caramancion   +3 more
semanticscholar   +1 more source

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence [PDF]

open access: yesIEEE International Conference on Data Engineering, 2021
Log-based cyber threat hunting has emerged as an important solution to counter sophisticated cyber attacks. However, existing approaches require non-trivial efforts of manual query construction and have overlooked the rich external knowledge about threat
Peng Gao   +9 more
semanticscholar   +1 more source

STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]

open access: yes, 2018
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique   +2 more
core   +1 more source

Off-the-Shelf Solutions as Potential Cyber Threats to Industrial Environments and Simple-To-Implement Protection Methodology

open access: yesIEEE Access, 2022
The paper investigates cyber threats and potential solutions for protecting industrial control systems (ICS). On the cyber threats side, different off-the-shelf offensive solutions, both hardware and software, are analysed and tested.
M. Slunjski   +3 more
semanticscholar   +1 more source

Protecting Cyber Physical Systems Using a Learned MAPE-K Model

open access: yesIEEE Access, 2019
Industry 4.0 leverages on cyber-physical systems (CPSs) that enable different physical sensors, actuators, and controllers to be interconnected via switches and cloud computing servers, forming complex online systems.
Ibrahim Elgendi   +3 more
doaj   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Various types of cyber threats [PDF]

open access: yesSrpska Politička Misao
Security of the Internet and online communication has become an essential challenge in contemporary world. Paper discusses different types of cyber threats: cyber-attack, cyber terrorism and cybercrime.
Luknar Ivana, Jovanović Filip
doaj   +1 more source

Cyberthreats on Implantable Medical Devices

open access: yesJournal of Information Security and Cybercrimes Research, 2021
The significant and rapid technological development in the field of medical care, and Implanted Medical Device, clearly lead to improve the quality of care and effectiveness of treatment for numerous diseases that were previously difficult to be ...
Mohammed N. A. Sabra
doaj   +1 more source

Home - About - Disclaimer - Privacy