Works matching Cyber intelligence (Computer security)
Results: 593
Cyber Environment Test Framework for Simulating Command and Control Attack Methods with Reinforcement Learning.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2120, doi. 10.3390/app15042120
- By:
- Publication type:
- Article
Unmasking the True Identity: Unveiling the Secrets of Virtual Private Networks and Proxies.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 126, doi. 10.3390/info16020126
- By:
- Publication type:
- Article
Cybercrime Resilience in the Era of Advanced Technologies: Evidence from the Financial Sector of a Developing Country.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 38, doi. 10.3390/computers14020038
- By:
- Publication type:
- Article
Revealing Secrets: An Unofficial History of Australian Signals Intelligence and the Advent of Cyber: By John Blaxland and Clare Birgin. Sydney: UNSW Press, 2023. Pp. 451. A$49.99 paper.
- Published in:
- Australian Historical Studies, 2024, v. 55, n. 2, p. 409, doi. 10.1080/1031461X.2024.2330120
- By:
- Publication type:
- Article
A RAkEL-based methodology to estimate software vulnerability characteristics & score - an application to EU project ECHO.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 7, p. 9459, doi. 10.1007/s11042-021-11073-x
- By:
- Publication type:
- Article
A study on manufacturing facility safety system using multimedia tools for cyber physical systems.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 26/27, p. 34553, doi. 10.1007/s11042-020-09925-z
- By:
- Publication type:
- Article
Ethics of AI and Cybersecurity When Sovereignty is at Stake.
- Published in:
- Minds & Machines, 2019, v. 29, n. 4, p. 635, doi. 10.1007/s11023-019-09508-4
- By:
- Publication type:
- Article
Is Cybersecurity a Public Good?
- Published in:
- 2019
- By:
- Publication type:
- Editorial
Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018.
- Published in:
- Computational & Mathematical Organization Theory, 2020, v. 26, n. 4, p. 465, doi. 10.1007/s10588-019-09298-1
- By:
- Publication type:
- Article
网络威胁技战术情报识别提取生成式技术研究.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2025, v. 19, n. 1, p. 118, doi. 10.3778/j.issn.1673-9418.2405088
- By:
- Publication type:
- Article
Fintech firms and banks sustainability: Why cybersecurity risk matters?
- Published in:
- International Journal of Financial Engineering, 2021, v. 8, n. 2, p. N.PAG, doi. 10.1142/S2424786321500195
- By:
- Publication type:
- Article
Cyber security in marine transport: opportunities and legal challenges.
- Published in:
- Scientific Journal of Maritime Research, 2021, v. 35, n. 2, p. 248, doi. 10.31217/p.35.2.7
- By:
- Publication type:
- Article
Shipboard ECDIS Cyber Security: Third-Party Component Threats.
- Published in:
- Scientific Journal of Maritime Research, 2019, v. 33, n. 2, p. 176, doi. 10.31217/p.33.2.7
- By:
- Publication type:
- Article
COVID-19's Impact on Organizational Cybersecurity Posture: Part one of this two-part article looks at some of the rapid changes that happened in the work place due to COVID-19 and their implications to cybersecurity.
- Published in:
- ISSA Journal, 2021, v. 19, n. 7, p. 16
- By:
- Publication type:
- Article
The Ethical Use of Machine Learning in Cybersecurity.
- Published in:
- ISSA Journal, 2021, v. 19, n. 1, p. 12
- By:
- Publication type:
- Article
Immaturity & Moral Hazard in the Cyber Insurance Market.
- Published in:
- ISSA Journal, 2020, v. 18, n. 1, p. 35
- By:
- Publication type:
- Article
Why Does Asset Management Matter for Cybersecurity?
- Published in:
- ISSA Journal, 2020, v. 18, n. 1, p. 13
- By:
- Publication type:
- Article
A Conversation with Jinan Budge | Forrester Cybersecurity Predictions 2020.
- Published in:
- ISSA Journal, 2020, v. 18, n. 1, p. 12
- By:
- Publication type:
- Article
Unusual Gathering XXXV | Cybersecurity in Space and at Sea.
- Published in:
- ISSA Journal, 2019, v. 17, n. 12, p. 13
- Publication type:
- Article
Immaturity & Moral Hazard in the Cyber Insurance Market.
- Published in:
- ISSA Journal, 2019, v. 17, n. 10, p. 14
- By:
- Publication type:
- Article
Creating a Cyber Risk Intelligence Framework: Integrating Best Practices and Standards.
- Published in:
- ISSA Journal, 2019, v. 17, n. 9, p. 24
- By:
- Publication type:
- Article
Hello, ISSA Members and Friends.
- Published in:
- ISSA Journal, 2019, v. 17, n. 9, p. 3
- By:
- Publication type:
- Article
Cybersecurity Education: The Quest to Building "Bridge" Skills.
- Published in:
- ISSA Journal, 2019, v. 17, n. 8, p. 18
- By:
- Publication type:
- Article
Colliding Forces in Cybersecurity Hiring.
- Published in:
- ISSA Journal, 2019, v. 17, n. 8, p. 8
- By:
- Publication type:
- Article
Get it Right: Offense Versus Defense.
- Published in:
- ISSA Journal, 2018, v. 16, n. 4, p. 8
- By:
- Publication type:
- Article
IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 9, p. 1364, doi. 10.3390/math12091364
- By:
- Publication type:
- Article
Improvement of Distributed Denial of Service Attack Detection through Machine Learning and Data Processing.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 9, p. 1294, doi. 10.3390/math12091294
- By:
- Publication type:
- Article
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 12, p. 2054, doi. 10.3390/math10122054
- By:
- Publication type:
- Article
Hackback: Der digitale Gegenschlag auf dem rechtlichen Prüfstand.
- Published in:
- IM + io, 2023, n. 3, p. 42
- By:
- Publication type:
- Article
Von falschen Freunden und echten Feinden: Die Facetten des Cyberkriegs.
- Published in:
- IM + io, 2023, n. 3, p. 14
- Publication type:
- Article
„ChatGPT, generiere mir einen Hackerangriff": Wie Künstliche Intelligenz Cybersicherheit neu definiert.
- Published in:
- IM + io, 2023, n. 3, p. 8
- By:
- Publication type:
- Article
TECHNOECONOMIC CHANGES AND SECURITY: NEW PARADIGM?
- Published in:
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2020, v. 20, n. 39, p. 53
- By:
- Publication type:
- Article
OPERATIONAL TECHNOLOGY CYBERSECURITY: HOW VULNERABLE IS OUR CRITICAL INFRASTRUCTURE?
- Published in:
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2019, v. 19, n. 37, p. 9
- By:
- Publication type:
- Article
A Retrospective Analysis of Maritime Cyber Security Incidents.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 519, doi. 10.12716/1001.15.03.04
- By:
- Publication type:
- Article
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2020, v. 14, n. 2, p. 271, doi. 10.12716/1001.14.02.01
- By:
- Publication type:
- Article
Before Teaching Cybersecurity in the University: Usability Analysis of the Cloud Platform with Learner’s Perspective.
- Published in:
- TEM Journal, 2019, v. 8, n. 3, p. 733, doi. 10.18421/TEM83-06
- By:
- Publication type:
- Article
Akıllı Şebekelerde İletişim Altyapısı ve Siber Güvenlik.
- Published in:
- Journal of the Institute of Science & Technology / Iğdır Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2020, v. 10, n. 2, p. 970, doi. 10.21597/jist.655990
- By:
- Publication type:
- Article
Cyber Teaming and Role Specialization in a Cyber Security Defense Competition.
- Published in:
- Frontiers in Psychology, 2018, p. N.PAG, doi. 10.3389/fpsyg.2018.02133
- By:
- Publication type:
- Article
THE EVOLUTION OF NATO'S CYBER SECURITY POLICY AND FUTURE PROSPECTS.
- Published in:
- Journal of Defense Resources Management, 2019, v. 10, n. 1, p. 94
- By:
- Publication type:
- Article
Investigating IPTV Malware in the Wild.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 325, doi. 10.3390/fi15100325
- By:
- Publication type:
- Article
A New AI-Based Semantic Cyber Intelligence Agent.
- Published in:
- Future Internet, 2023, v. 15, n. 7, p. 231, doi. 10.3390/fi15070231
- By:
- Publication type:
- Article
An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 40, doi. 10.3390/fi13020040
- By:
- Publication type:
- Article
A Systematic Review of Cybersecurity Risks in Higher Education.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 39, doi. 10.3390/fi13020039
- By:
- Publication type:
- Article
Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management.
- Published in:
- Future Internet, 2020, v. 12, n. 9, p. 157, doi. 10.3390/fi12090157
- By:
- Publication type:
- Article
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence.
- Published in:
- Future Internet, 2020, v. 12, n. 6, p. 108, doi. 10.3390/fi12060108
- By:
- Publication type:
- Article
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives.
- Published in:
- Future Internet, 2020, v. 12, n. 4, p. 62, doi. 10.3390/fi12040062
- By:
- Publication type:
- Article
Improving Forensic Triage Efficiency through Cyber Threat Intelligence.
- Published in:
- Future Internet, 2019, v. 11, n. 7, p. 162, doi. 10.3390/fi11070162
- By:
- Publication type:
- Article
Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues.
- Published in:
- Future Internet, 2019, v. 11, n. 3, p. 73, doi. 10.3390/fi11030073
- By:
- Publication type:
- Article
Cyber Security Threat Modeling for Supply Chain Organizational Environments.
- Published in:
- Future Internet, 2019, v. 11, n. 3, p. 63, doi. 10.3390/fi11030063
- By:
- Publication type:
- Article
K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 2, p. 337, doi. 10.3390/sym15020337
- By:
- Publication type:
- Article