Results 41 to 50 of about 142,803 (291)

Tracking advanced persistent threats in critical infrastructures through opinion dynamics [PDF]

open access: yes, 2018
Advanced persistent threats pose a serious issue for modern industrial environments, due to their targeted and complex attack vectors that are difficult to detect.
A Lemay   +10 more
core   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

CYBER SECURITY IN TRANSPORTATION

open access: yesInternational Journal of Advanced Studies
The fast pace of scientific and technological progress in terms of informatisation and digitalisation of society entails the risk of increasing cyber threats, which pose a serious problem for organisations, as the pace of development of digital and ...
Olga V. Knyazkina   +3 more
doaj   +1 more source

The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century

open access: yesBaltic Journal of Law & Politics, 2017
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of ...
Faga Hemen Philip
doaj   +1 more source

Predicting Cyber Events by Leveraging Hacker Sentiment

open access: yes, 2018
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok   +2 more
core   +1 more source

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

Cybersecurity Practices for Social Media Users: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy, 2022
In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. Through following a structured methodological approach of the systematic literature review presented, aspects ...
Thilini B. G. Herath   +2 more
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Automated Cyber and Privacy Risk Management Toolkit

open access: yesSensors, 2021
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy