Results 161 to 170 of about 4,651 (188)
Some of the next articles are maybe not open access.
Cyber Security: A Peer-Reviewed Journal, 2018
If your organisation experienced a cyberattack tomorrow, how would your defences cope? Would they keep your company‘s applications and data safe from harm, or would they fall victim to the attack? This paper highlights five of the most common threats that businesses experience, including polymorphic malware, man-in-the-middle attacks, cryptominers ...
openaire +1 more source
If your organisation experienced a cyberattack tomorrow, how would your defences cope? Would they keep your company‘s applications and data safe from harm, or would they fall victim to the attack? This paper highlights five of the most common threats that businesses experience, including polymorphic malware, man-in-the-middle attacks, cryptominers ...
openaire +1 more source
Cyberattacker Profiles, Cyberattack Models and Scenarios, and Cybersecurity Ontology
2023openaire +1 more source

