Results 71 to 80 of about 1,175,680 (325)

Cyber Threats Against the North Atlantic Treaty Organization (NATO) and Selected Responses

open access: yesİstanbul Gelişim Üniversitesi Sosyal Bilimler Dergisi, 2014
This article focuses on the disparate cyber threats against the North Atlantic Treaty Organization (NATO), its members, and selected NATO responses to such perils.
Dean Alexander
doaj   +1 more source

Building Cyber Resilience: Key Factors for Enhancing Organizational Cyber Security

open access: yesJournal of Informatics and Web Engineering, 2023
The increasingly pervasive influence of technology on a global scale, coupled with the accelerating pace of organizations operating in cyberspace, has intensified the need for adequate protection against the risks posed by cyber threats.
Thavaselvi Munusamy, Touraj Khodadi
doaj   +1 more source

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?

open access: yesBritish Educational Research Journal, EarlyView.
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley   +1 more source

Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data

open access: yesApplied Sciences, 2022
Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats.
Lucas José Borges Amaro   +5 more
doaj   +1 more source

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Cyber Threat Intelligence [PDF]

open access: yes, 2018
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
openaire   +2 more sources

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Smart Grid Security: Threats, Challenges, and Solutions [PDF]

open access: yes, 2016
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points.
Biswas, Saroj   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy