scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "CYBERTERRORISM"

1 - 10 of 34,965 results for
 "CYBERTERRORISM"
Results per page:

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 9/27/2022, p1-16. 16p.

Abstract: Cyber threat hunting is a proactive search process for hidden threats in an organization's information system. It is a crucial component of active defense against advanced persistent threats (APTs). However, most of the current threat hunting methods r...

View details

Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2023, Vol. 74 Issue 1, p235-252. 18p.

Abstract: The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats (APT). Extracting attack behaviors, i.e., Tactics, Techniques, Procedures (TTP) from Cyber Threat Intelligence (CT...

View details

An AI-Driven Hybrid Framework for Intrusion Detection in IoT-Enabled E-Health.

Publication Type: Academic Journal

Source(s): Computational Intelligence & Neuroscience. 8/21/2022, p1-11. 11p.

Abstract: E-health has grown into a billion-dollar industry in the last decade. Its device's high throughput makes it an obvious target for cyberattacks, and these environments desperately need protection. In this scientific study, we presented an artificial int...

View details

An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix.

Publication Type: Academic Journal

Source(s): Wireless Communications & Mobile Computing. 8/8/2022, p1-12. 12p.

Abstract: With the occurrence of cyber security incidents, the value of threat intelligence is coming to the fore. Timely extracting Indicator of Compromise (IOC) from cyber threat intelligence can quickly respond to threats. However, the sparse text in public t...

View details

Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 7/20/2022, p1-13. 13p.

Abstract: The Internet of Things (IoT) is a broad term that refers to the collection of information about all of the items that are linked to the Internet. It supervises and controls the functions from a distance, without the need for human interaction. It has t...

View details

IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS.

Publication Type: Academic Journal

Source(s): International Journal of Advanced Research in Computer Science. Jul/Aug2022, Vol. 13 Issue 4, p28-34. 7p.

Abstract: Cyber threats have increased drastically in the recent years and the most common targets are organisation applications or sys tems for data theft, disrupting the operations or any other malicious use. Incorporating website security prevents these sorts...

View details

Blockchain Technology: A Panacea for IoT Security Challenge.

Publication Type: Academic Journal

Source(s): EAI Endorsed Transactions on Internet of Things. 2022, Vol. 8 Issue 3, p1-7. 7p.

Abstract: The Internet of Things (IoT) platforms, despite the wide range of application is not without loop holes of which cyberattackers can take advantage. In order to improve the platform's security while also increasing other features, it has been proposed t...

View details

Identifying Key Relationships between Nation-State Cyberattacks and Geopolitical and Economic Factors: A Model.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 6/29/2022, p1-11. 11p.

Abstract: Nation-state cyberattacks, and particularly Advanced Persistent Threats (APTs), have rocketed in the last years. Their use may be aligned with nation-state geopolitical and economic (GPE) interests, which are key for the underlying international relati...

View details

Securing the IoT System of Smart City against Cyber Threats Using Deep Learning.

Publication Type: Academic Journal

Source(s): Discrete Dynamics in Nature & Society. 6/26/2022, p1-9. 9p.

Abstract: The idea of a smart city is to connect physical objects or things with sensors, software, electronics, and Internet connectivity for data communication through the Internet of Things (IoT) devices. IoT enhances productivity and efficacy intelligently u...

View details

A US history of not conducting cyber attacks.

Publication Type: Periodical

Source(s): Bulletin of the Atomic Scientists. Jul2022, Vol. 78 Issue 4, p208-213. 6p.

Authors:

Abstract: There were numerous occasions when the US military considered conducting cyber attacks but refrained from doing so, but these have been largely overlooked as sources of insight. Six cases that we do know about – mostly from journalistic reporting – rev...

View details
sponsored