Results 41 to 50 of about 142,803 (291)
Tracking advanced persistent threats in critical infrastructures through opinion dynamics [PDF]
Advanced persistent threats pose a serious issue for modern industrial environments, due to their targeted and complex attack vectors that are difficult to detect.
A Lemay +10 more
core +1 more source
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
CYBER SECURITY IN TRANSPORTATION
The fast pace of scientific and technological progress in terms of informatisation and digitalisation of society entails the risk of increasing cyber threats, which pose a serious problem for organisations, as the pace of development of digital and ...
Olga V. Knyazkina +3 more
doaj +1 more source
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of ...
Faga Hemen Philip
doaj +1 more source
Predicting Cyber Events by Leveraging Hacker Sentiment
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Deb, Ashok +2 more
core +1 more source
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. Through following a structured methodological approach of the systematic literature review presented, aspects ...
Thilini B. G. Herath +2 more
doaj +1 more source
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Automated Cyber and Privacy Risk Management Toolkit
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo +8 more
doaj +1 more source

