Results 71 to 80 of about 21,893 (200)

The social and legislative principles of counteracting ransomware crime

open access: yesEntrepreneurship and Sustainability Issues, 2020
This article aims to analyze the relationship between the threat of ransomware and new effective counteraction principles for law enforcement agencies to utilize. Moreover, it contemplates on how specific behavior of persons can help reduce the threat of
Mafura Uandykova   +6 more
doaj   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks

open access: yesIEEE Access, 2020
In recent times, ransomware has become the most significant cyber-attack targeting individuals, enterprises, healthcare industries, and the Internet of Things (IoT). Existing security systems like Intrusion Detection and Prevention System (IDPS) and Anti-
S. Sibi Chakkaravarthy   +4 more
doaj   +1 more source

Resilient IT: Winning With People and Process

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT In today's dynamic environment, IT organisations face numerous challenges from disruptions such as natural disasters, cybersecurity threats, international conflicts, evolving regulations, pandemics and recent global incidents such as the CrowdStrike outage.
Wesam Helou   +2 more
wiley   +1 more source

IoT Botnets Analysis [PDF]

open access: yes, 2017
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S.   +2 more
core  

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Regulating critical technologies: National security and intellectual property

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley   +1 more source

When Business Breaks the Rules: The Value of a Criminology‐Informed “Organizational” Perspective for the Regulation of White‐Collar and Corporate Crimes

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This article argues that if the aspiration is to enhance regulatory and governance responses to white‐collar and corporate crimes, consideration of the organization of these offending behaviors must be central to the scholarly, practice, and policy discussion.
Nicholas Lord, Michael Levi
wiley   +1 more source

Malware Detection using Machine Learning and Deep Learning

open access: yes, 2019
Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware.
A Nappa   +6 more
core   +1 more source

An interorganizational task force for disasters affecting US blood supply

open access: yesVox Sanguinis, EarlyView.
Abstract Background and Objectives The US Interorganizational Task Force for Domestic Disasters and Acts of Terrorism (Interorganizational Disaster Task Force [IDTF]) is coordinated by the Association for the Advancement of Blood & Biotherapies (AABB).
Glenn Ramsey, Frank Berry
wiley   +1 more source

Home - About - Disclaimer - Privacy