scroll to top

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "Cyberterrorism"

1 - 10 of 35,747 results for
Results per page:

A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats.

Publication Type: Academic Journal

Source(s): Intelligent Automation & Soft Computing. 2023, Vol. 35 Issue 3, p3331-3348. 18p.

Abstract: Attacks on the cyber space is getting exponential in recent times. Illegal penetrations and breaches are real threats to the individuals and organizations. Conventional security systems are good enough to detect the known threats but when it comes to A...

Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 2/13/2023, p1-20. 20p.

Abstract: Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is collected, processed, analysed, and disseminated to the right audience, in order to comprehend a malicious threat actor's motivation, goals, objectives, targets, ...

Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks.

Publication Type: Academic Journal

Source(s): Computers, Materials & Continua. 2023, Vol. 74 Issue 1, p235-252. 18p.

Abstract: The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats (APT). Extracting attack behaviors, i.e., Tactics, Techniques, Procedures (TTP) from Cyber Threat Intelligence (CT...


Publication Type: Periodical

Source(s): TIME Magazine. 2/13/2023, Vol. 201 Issue 5/6, p54-59. 6p. 4 Color Photographs.

Abstract: 2030| TECHNOLOGY ONE OF THE SECRETS TO BUILDING THE WORLD'S most powerful computer is probably perched by your bathroom sink. This is the building block of all digital computation Quantum computers rely on qubits, which because of quantum superposition...

Cyber Loss Distribution Fitting: A General Framework towards Cyber Bonds and Their Pricing Models.

Publication Type: Academic Journal

Source(s): International Journal of Mathematics & Mathematical Sciences. 12/31/2022, Vol. 2022, p1-20. 20p.

Abstract: Motivated by the considerable amount of losses in (finance) industry caused every year by the fast growing number of malicious cyber events and the need of an insurance against such cyber losses, we propose a general framework of cyber bond, whose main...

Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application.

Publication Type: Academic Journal

Source(s): Human Behavior & Emerging Technologies. 12/7/2022, p1-10. 10p.

Abstract: A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns toda...

Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture.

Publication Type: Academic Journal

Source(s): International Journal of Intelligent Systems. Dec2022, Vol. 37 Issue 12, p11167-11187. 21p.

Abstract: With recent cyber security attacks, the "border defense" security protection mechanism has often penetrated and broken through, and the "borderless" security defense idea—Zero Trust was proposed. The device application sandbox deployment model is one o...

A Comparative Analysis of the Factors Predicting Fears of Terrorism and Cyberterrorism in a Developing Nation Context.

Publication Type: Academic Journal

Source(s): Journal of Ethnic & Cultural Studies. 2022, Vol. 9 Issue 4, p106-119. 14p.

Abstract: Considering the continuous use of cyberspace for cyberattacks and terrorism, the current study examined the phenomena of the fear of terrorism and cyberterrorism. It also investigates the factors influencing the fear of terrorism and of cyberterrorism ...


Publication Type: Academic Journal

Source(s): Journal of Syntax Literate. okt2022, Vol. 7 Issue 10, p14947-14959. 13p.

Abstract: Intrusion Detection system (IDS) adalah sebuah sistem yang bertugas memantau lalu lintas jaringan untuk mendeteksi aktivitas yang mencurigakan dan tidak normal dan memberikan peringatan ketika aktivitas tersebut terdeteksi. Penggunaan Intrusion Detecti...

Network Forensics Against Volumetric-Based Distributed Denial of Service Attacks on Cloud and the Edge Computing.

Publication Type: Academic Journal

Source(s): International Journal of Safety & Security Engineering. Oct2022, Vol. 12 Issue 5, p577-588. 12p.

Abstract: Cyber attacks are increasingly rampant and even damage the reputation of companies, agencies, and services. DDoS attacks have been overgrowing in the last year, which has resulted in substantial losses. Volumetric-based Distributed Denial of Service (D...