Results 31 to 40 of about 142,803 (291)

Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise ...
Michele Kielty, A. Renee Staton
doaj  

Actual and future digital threats and their impact on civil and military cybersecurity management

open access: yesDefence Science Review, 2022
Objectives (1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4)
Oriana Helena Negulescu   +2 more
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Cyber Warfare and National Security

open access: yesChina Quarterly of International Strategic Studies
This study aims to provide insights into cyber threats as a new form of conflict, their regulation under international law, and the potential measures that nations, particularly China, can adopt to mitigate their harmful consequences.
Khoirunnisa Khoirunnisa   +4 more
doaj   +1 more source

Cyber Insurance for Heterogeneous Wireless Networks

open access: yes, 2017
Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume.
Jiang, Hai   +4 more
core   +1 more source

STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]

open access: yes, 2018
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique   +2 more
core   +1 more source

Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence

open access: yesJournal of Computer Virology and Hacking Techniques
In today's dynamic cybersecurity landscape, timely and accurate threat intelligence is essential for proactive defense. This study explores the potential of social media platforms as a valuable resource for extracting actionable Indicators of Compromise (IoCs).
Dincy R. Arikkat   +5 more
openaire   +2 more sources

Unifying Cyber Threat Intelligence [PDF]

open access: yes, 2019
The threat landscape and the associated number of IT security incidents are constantly increasing. In order to address this problem, a trend towards cooperative approaches and the exchange of information on security incidents has been developing over recent years. Today, several different data formats with varying properties are available that allow to
Menges, Florian   +2 more
openaire   +2 more sources

Toward Environmentally Friendly Hydrogel‐Based Flexible Intelligent Sensor Systems

open access: yesAdvanced Intelligent Discovery, EarlyView.
This review summarizes environmentally and biologically friendly hydrogel‐based flexible sensor systems focusing on physical, chemical, and physiological sensors. Furthermore, device concepts moving forward for the practical application are discussed about wireless integration, the interface between hydrogel and dry electronics, automatic data analysis
Sudipta Kumar Sarkar, Kuniharu Takei
wiley   +1 more source

Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject of this study is to ensure the cybersecurity of systems of multifunctional UAV fleets (SMF UAV). The purpose of this study is to identify and analyze the risks associated with the cybersecurity of multi-functional UAV fleets, develop models ...
Heorhii Zemlianko, Vyacheslav Kharchenko
doaj   +1 more source

Home - About - Disclaimer - Privacy