Results 31 to 40 of about 196,474 (374)

Emergent Behavior in Cybersecurity [PDF]

open access: yes, 2014
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core   +1 more source

CEPS Task Force on Artificial Intelligence and Cybersecurity Technology, Governance and Policy Challenges Task Force Evaluation of the HLEG Trustworthy AI Assessment List (Pilot Version). CEPS Task Force Report 22 January 2020 [PDF]

open access: yes, 2020
The Centre for European Policy Studies launched a Task Force on Artificial Intelligence (AI) and Cybersecurity in September 2019. The goal of this Task Force is to bring attention to the market, technical, ethical and governance challenges posed by the ...
Fantin, Stephano   +2 more
core  

Insight: Cybersecurity

open access: yesITNOW, 2021
Abstract Deepthi Ratnayake MBCS, Senior Lecturer in Computer Science, explains the Colonial Pipeline attack that revolutionised ransomware landscape.
openaire   +1 more source

Enacting Expertise: Ritual and Risk in Cybersecurity

open access: yesPolitics and Governance, 2018
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessary to tackle contemporary cybersecurity challenges.
James Shires
doaj   +1 more source

Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side [PDF]

open access: yes, 2020
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side.
Buriachok, Volodymyr   +7 more
core  

Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity [PDF]

open access: yes, 2019
31 pages. Chapter in Springer 2019 book entitled "Proactive and Dynamic Network Defense"
openaire   +2 more sources

Cybersecurity compliance in financial institutions: A comparative analysis of global standards and regulations

open access: yesInternational Journal of Science and Research Archive
Cybersecurity is a critical concern for financial institutions worldwide, given the increasing frequency and sophistication of cyberattacks. This paper conducts a comparative analysis of global standards and regulations governing cybersecurity compliance
Ngozi Samuel Uzougbo   +2 more
semanticscholar   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

A Subjective Expressions Extracting Method for Social Opinion Mining

open access: yesDiscrete Dynamics in Nature and Society, 2020
Opinion mining plays an important role in public opinion monitoring, commodity evaluation, government governance, and other areas. One of the basic tasks of opinion mining is to extract the expression elements, which can be further divided into direct ...
Mingyong Yin   +4 more
doaj   +1 more source

Trusted CI Experiences in Cybersecurity and Service to Open Science

open access: yes, 2019
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence.
Adams, Andrew   +18 more
core   +1 more source

Home - About - Disclaimer - Privacy