|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,...
ver más
|
|
|
|
|
|
|
Aynaz Biniyaz, Behnam Azmoon, Ye Sun and Zhen Liu
Subsurface drainage has been widely accepted to mitigate the hazard of landslides in areas prone to flooding. Specifically, the use of drainage wells with pumping systems has been recognized as an effective short-term solution to lower the groundwater ta...
ver más
|
|
|
|
|
|
|
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m...
ver más
|
|
|
|
|
|
|
Stefan Claus and Massimo Stella
The ability to spot key ideas, trends, and relationships between them in documents is key to financial services, such as banks and insurers. Identifying patterns across vast amounts of domain-specific reports is crucial for devising efficient and targete...
ver más
|
|
|
|
|
|
|
Ruobin Qi, Craig Rasband, Jun Zheng and Raul Longoria
Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adversa...
ver más
|
|
|
|
|
|
|
Tianfang Sun, Pin Yang, Mengming Li and Shan Liao
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence, han...
ver más
|
|
|
|
|
|
|
Joachim Bjørge Ulven and Gaute Wangen
The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR) Mo...
ver más
|
|
|
|
|
|
|
Hossein Hassani, Stephan Unger and Christina Beneki
This article investigates the impact of big data on the actuarial sector. The growing fields of applications of data analytics and data mining raise the ability for insurance companies to conduct more accurate policy pricing by incorporating a broader va...
ver más
|
|
|
|
|
|
|
Mounir Hafsa and Farah Jemili
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data ...
ver más
|
|
|
|