|
|
|
Mazen Gazzan and Frederick T. Sheldon
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat...
ver más
|
|
|
|
|
|
|
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of...
ver más
|
|
|
|
|
|
|
Adam James Fenton
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary...
ver más
|
|
|
|
|
|
|
Chao Liu, Buhong Wang, Zhen Wang, Jiwei Tian, Peng Luo and Yong Yang
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately rec...
ver más
|
|
|
|
|
|
|
Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using...
ver más
|
|
|
|
|
|
|
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi...
ver más
|
|
|
|
|
|
|
Nureni Ayofe Azeez and Emad Fadhal
Background: Internet social media platforms have become quite popular, enabling a wide range of online users to stay in touch with their friends and relatives wherever they are at any time. This has led to a significant increase in virtual crime from the...
ver más
|
|
|
|
|
|
|
Olha Shulha, Iryna Yanenkova, Mykhailo Kuzub, Iskandar Muda and Viktor Nazarenko
The rapid development of the process of informatization of modern society has necessitated cybersecurity in all spheres of human activity, as the implementation of deliberate or unintentional influences on the information sphere by both external and inte...
ver más
|
|
|
|
|
|
|
Avi Shaked and Oded Margalit
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems and organisations. An organisation should, therefore, continuously monitor for new threats and properly contextualise them to identify and manage the res...
ver más
|
|
|
|
|
|
|
Virgínia de Melo Dantas Trinks, Robson de Oliveira Albuquerque, Rafael Rabelo Nunes and Gibran Ayupe Mota
The current international commercial structure places Brazilian Agribusiness in constant conflict to protect its interests before other nations in the global market. Technological innovations are used in all stages from the simplest production tasks, up ...
ver más
|
|
|
|