66   Artículos

« Anterior     Página: 1 de 4     Siguiente »

 
en línea
Virgínia de Melo Dantas Trinks, Robson de Oliveira Albuquerque, Rafael Rabelo Nunes and Gibran Ayupe Mota    
The current international commercial structure places Brazilian Agribusiness in constant conflict to protect its interests before other nations in the global market. Technological innovations are used in all stages from the simplest production tasks, up ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis and Vasilios Katos    
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security anal... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Alessandra de Melo e Silva, João José Costa Gondim, Robson de Oliveira Albuquerque and Luis Javier García Villalba    
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated threats with multi-v... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abel Yeboah-Ofori and Shareeful Islam    
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution co... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fahim Sufi    
The surge in cybercrime has emerged as a pressing concern in contemporary society due to its far-reaching financial, social, and psychological repercussions on individuals. Beyond inflicting monetary losses, cyber-attacks exert adverse effects on the soc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fahim Sufi    
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe... ver más
Revista: Information    Formato: Electrónico

 
en línea
Peter R. J. Trim and Yang-Im Lee    
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with sociocul... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Boldizsár Bencsáth, Gábor Pék, Levente Buttyán and Márk Félegyházi    
Stuxnet was the first targeted malware that received worldwide attention for causing physical damage in an industrial infrastructure seemingly isolated from the online world. Stuxnet was a powerful targeted cyber-attack, and soon other malware samples we... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Chao Liu, Buhong Wang, Zhen Wang, Jiwei Tian, Peng Luo and Yong Yang    
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately rec... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Fahim Sufi    
In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from October... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jeremy Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite and Siraj Ahmed Shaikh    
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS) are becoming increasingly complex, but demonstrating the security of CPS is hard and security is frequently compromised. These compromises can lead to safety failure... ver más
Revista: Information    Formato: Electrónico

 
en línea
Obinna Johnphill, Ali Safaa Sadiq, Feras Al-Obeidat, Haider Al-Khateeb, Mohammed Adam Taheir, Omprakash Kaiwartya and Mohammed Ali    
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide range of cyber threats, including those from new devices deployed during the development of scenarios. With recent advancements in automobiles, medical dev... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ibrahim Ba?abbad and Omar Batarfi    
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer and Vasilis Katos    
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from differen... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Rajagopal Maheswar and Josip Lorincz    
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyb... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao    
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Olha Shulha, Iryna Yanenkova, Mykhailo Kuzub, Iskandar Muda and Viktor Nazarenko    
The rapid development of the process of informatization of modern society has necessitated cybersecurity in all spheres of human activity, as the implementation of deliberate or unintentional influences on the information sphere by both external and inte... ver más

 
en línea
Yunja Yoo and Han-Seon Park    
The International Maritime Organization (IMO) published the Guidelines on Maritime Cyber Risk Management in 2017 to strengthen cybersecurity in consideration of digitalized ships. As part of these guidelines, the IMO recommends that each flag state shoul... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Nisha Rawindaran, Ambikesh Jayal, Edmond Prakash and Chaminda Hewage    
Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable mali... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tianfang Sun, Pin Yang, Mengming Li and Shan Liao    
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence, han... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »