Results 31 to 40 of about 196,474 (374)
Emergent Behavior in Cybersecurity [PDF]
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core +1 more source
CEPS Task Force on Artificial Intelligence and Cybersecurity Technology, Governance and Policy Challenges Task Force Evaluation of the HLEG Trustworthy AI Assessment List (Pilot Version). CEPS Task Force Report 22 January 2020 [PDF]
The Centre for European Policy Studies launched a Task Force on Artificial Intelligence (AI) and Cybersecurity in September 2019. The goal of this Task Force is to bring attention to the market, technical, ethical and governance challenges posed by the ...
Fantin, Stephano+2 more
core
Abstract Deepthi Ratnayake MBCS, Senior Lecturer in Computer Science, explains the Colonial Pipeline attack that revolutionised ransomware landscape.
openaire +1 more source
Enacting Expertise: Ritual and Risk in Cybersecurity
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges.
James Shires
doaj +1 more source
Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side [PDF]
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side.
Buriachok, Volodymyr+7 more
core
Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity [PDF]
31 pages. Chapter in Springer 2019 book entitled "Proactive and Dynamic Network Defense"
openaire +2 more sources
Cybersecurity is a critical concern for financial institutions worldwide, given the increasing frequency and sophistication of cyberattacks. This paper conducts a comparative analysis of global standards and regulations governing cybersecurity compliance
Ngozi Samuel Uzougbo+2 more
semanticscholar +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed+8 more
wiley +1 more source
A Subjective Expressions Extracting Method for Social Opinion Mining
Opinion mining plays an important role in public opinion monitoring, commodity evaluation, government governance, and other areas. One of the basic tasks of opinion mining is to extract the expression elements, which can be further divided into direct ...
Mingyong Yin+4 more
doaj +1 more source
Trusted CI Experiences in Cybersecurity and Service to Open Science
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew+18 more
core +1 more source