Results 51 to 60 of about 1,175,680 (325)
Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise ...
Michele Kielty, A. Renee Staton
doaj
Actual and future digital threats and their impact on civil and military cybersecurity management
Objectives (1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4)
Oriana Helena Negulescu +2 more
doaj +1 more source
Automated Cyber and Privacy Risk Management Toolkit
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic ...
Gustavo Gonzalez-Granadillo +8 more
doaj +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy ...
Frye, Jason Neal +6 more
openaire +2 more sources
A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks
The astonishing growth of sophisticated ever-evolving cyber threats and attacks throws the entire Internet-of-Things (IoT) infrastructure into chaos. As the IoT belongs to the infrastructure of interconnected devices, it brings along significant security
Sirajuddin Qureshi +7 more
semanticscholar +1 more source
The subject of this study is to ensure the cybersecurity of systems of multifunctional UAV fleets (SMF UAV). The purpose of this study is to identify and analyze the risks associated with the cybersecurity of multi-functional UAV fleets, develop models ...
Heorhii Zemlianko, Vyacheslav Kharchenko
doaj +1 more source
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries.
openaire +1 more source
Enhancing Power Grid Resilience against Cyber Threats in the Smart Grid Era
In the age of smart grids, fortifying power grids against cyber threats has become of utmost importance. This paper reviews endeavours in the realms of defining, measuring, and scrutinising the resilience of smart grids.
R. Padmavathy +5 more
semanticscholar +1 more source
Cyber Warfare and National Security
This study aims to provide insights into cyber threats as a new form of conflict, their regulation under international law, and the potential measures that nations, particularly China, can adopt to mitigate their harmful consequences.
Khoirunnisa Khoirunnisa +4 more
doaj +1 more source

