Results 51 to 60 of about 1,175,680 (325)

Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise ...
Michele Kielty, A. Renee Staton
doaj  

Actual and future digital threats and their impact on civil and military cybersecurity management

open access: yesDefence Science Review, 2022
Objectives (1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4)
Oriana Helena Negulescu   +2 more
doaj   +1 more source

Automated Cyber and Privacy Risk Management Toolkit

open access: yesSensors, 2021
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo   +8 more
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Cyber Threat Metrics [PDF]

open access: yes, 2012
Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy ...
Frye, Jason Neal   +6 more
openaire   +2 more sources

A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks

open access: yesIEEE Access, 2021
The astonishing growth of sophisticated ever-evolving cyber threats and attacks throws the entire Internet-of-Things (IoT) infrastructure into chaos. As the IoT belongs to the infrastructure of interconnected devices, it brings along significant security
Sirajuddin Qureshi   +7 more
semanticscholar   +1 more source

Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject of this study is to ensure the cybersecurity of systems of multifunctional UAV fleets (SMF UAV). The purpose of this study is to identify and analyze the risks associated with the cybersecurity of multi-functional UAV fleets, develop models ...
Heorhii Zemlianko, Vyacheslav Kharchenko
doaj   +1 more source

Cyber Threat Hunting

open access: yesInternational Journal of Cognitive Informatics and Natural Intelligence, 2021
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries.
openaire   +1 more source

Enhancing Power Grid Resilience against Cyber Threats in the Smart Grid Era

open access: yesE3S Web of Conferences
In the age of smart grids, fortifying power grids against cyber threats has become of utmost importance. This paper reviews endeavours in the realms of defining, measuring, and scrutinising the resilience of smart grids.
R. Padmavathy   +5 more
semanticscholar   +1 more source

Cyber Warfare and National Security

open access: yesChina Quarterly of International Strategic Studies
This study aims to provide insights into cyber threats as a new form of conflict, their regulation under international law, and the potential measures that nations, particularly China, can adopt to mitigate their harmful consequences.
Khoirunnisa Khoirunnisa   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy