Zobrazeno 1 - 10
of 181
pro vyhledávání: '"threat hunting"'
Autor:
Akashdeep Bhardwaj, Salil Bharany, Ashraf Osman Ibrahim, Ahmad Almogren, Ateeq Ur Rehman, Habib Hamam
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100513- (2024)
The concept of the Internet of Things (IoT) threat surface refers to the overall susceptibility of smart devices to potential security risks. This vulnerability includes the combined impact of security weaknesses, gaps in protective measures, and pot
Externí odkaz:
https://doaj.org/article/2d802fac30d944a8b6f4fbd8f6bffbeb
Autor:
Yuancheng LI, Yukun LIN
Publikováno v:
Tongxin xuebao, Vol 45, Pp 106-114 (2024)
To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models
Externí odkaz:
https://doaj.org/article/c2fa129a62c64330bc33ce05f259f488
Autor:
Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 5, Pp 1123-1130 (2023)
Industrial Internet of Things (IIoT) systems depend on a growing number of edge devices such as sensors, controllers, and robots for data collection, transmission, storage, and processing. Any kind of malicious or abnormal function by each of these d
Externí odkaz:
https://doaj.org/article/ab8cff8e20ca41d39ec4afc1586a3198
Autor:
Marshall S. Rich
Publikováno v:
Analytics, Vol 2, Iss 3, Pp 618-655 (2023)
The rapid proliferation of cyberthreats necessitates a robust understanding of their evolution and associated tactics, as found in this study. A longitudinal analysis of these threats was conducted, utilizing a six-year data set obtained from a decep
Externí odkaz:
https://doaj.org/article/f4f5f8eb9be24207b543f5a44f052f3d
Publikováno v:
Intelligent Systems with Applications, Vol 20, Iss , Pp 200280- (2023)
Gathering information about cyber threats from various sources can help organisations improve proactive cyber defense and mitigate potential cyber attacks. Recently, Twitter has shown to be beneficial in providing timely Cyber Threat Intelligence (CT
Externí odkaz:
https://doaj.org/article/6ce27fb5292846c58fc2335fe03a2866
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of Information and Communication Technology Research, Vol 14, Iss 3, Pp 27-36 (2022)
Ransomware attacks are taking advantage of the ongoing coronavirus pandemics and attacking the vulnerable systems in the health sector. Modeling ransomware attacks help to identify and simulate attacks against security environments, using likely adve
Externí odkaz:
https://doaj.org/article/b8b610c576b342728313eff7f44598b7
Publikováno v:
Cybersecurity, Vol 5, Iss 1, Pp 1-16 (2022)
Abstract Hunting the advanced threats hidden in the enterprise networks has always been a complex and difficult task. Due to the variety of attacking means, it is difficult for traditional security systems to detect threats. Most existing methods ana
Externí odkaz:
https://doaj.org/article/c571f1bfa8444eb4a7e7dc11da61c74b
Publikováno v:
IEEE Access, Vol 10, Pp 61695-61706 (2022)
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments. Ransomware has variant families that
Externí odkaz:
https://doaj.org/article/1a01e2bc60af4bf3a4da29fa6d1903dd