Explore our curated collection of top research papers on Cyber Security. Dive into the latest insights and advancements in protecting information systems, networks, and data from cyber threats. This resource is perfect for academics, professionals, and anyone with an interest in understanding the evolving domain of cyber security.
Looking for research-backed answers?Try AI Search
Devorah Kletenik, Alon Butbul, Daniel Chan + 2 more
Proceedings of the 51st ACM Technical Symposium on Computer Science Education
An evaluation of the game on introductory Computer Science and Business students suggests that playing the game resulted in both short-term learning gains in cybersecurity as well as longer-term retention of the concepts.
A. Mhajne, Crystal Whetstone
International Affairs
This article draws on feminist security studies (FSS) to construct a more inclusive cybersecurity. We ask: What can a gendered lens do for cybersecurity? Methodologically, this exploratory piece brings FSS insights to bear on studies in cybersecurity (both traditional and critical) to better conceptualize the risks and benefits embedded in the cybersphere, as well as the role of gender in cyberspace. We propose incorporating a gendered lens (an intersectional approach) to shed light on violence and insecurity online. Without recognizing gendering in the cyber realm, including how gender inte...
D. Hsu, Dorothy Marinucci, J. Voas
Computer
Cybersecurity researchers and practitioners from academia, government, and industry present emerging technologies and methodologies that effectively mitigate various cyber threats.
S. Cheang, Sinawong Sang
2009 International Conference on Availability, Reliability and Security
The process to establish management and technical incident response capability of the national Computer Emergency Response Team to contain the on-going cyber incident is discussed.
Miloslava Plachkinova, Stuart Steiner, Morgan Shepherd + 1 more
journal unavailable
Organizations, of all sizes and at all levels, are faced with the challenge of continuously, effectively, and efficiently protecting their systems while enabling and ensuring their mission.
Christine Lino
journal unavailable
Since the first cyber-attack in 1988, online viruses have proliferated through personal, organizational and government computers worldwide with devastating consequences and further reports have highlighted flaws in the country's information infrastructure that put national security, public safety and personal privacy at risk.
Karo Saharinen, Jaakko Backlund, Jarmo Nevala
Proceedings of the 12th International Conference on Education Technology and Computers
The research found the education heavily responding to and emphasizing Operate and Maintain and Securely Provision categories of the framework, with others being present, but with smaller ECTS (European Credit Transfer System) offering in the institutions providing higher education.
N. Mishra
Cybersecurity
It is argued that GATS art XIVbis has limited relevance, and is potentially problematic, when used in justifying majority of cybersecurity measures, and countries must avoid casually relying upon security exceptions as a basis for adopting/implementing unilateral measures on cybersecurity.
Von Welch, Doug Pearson, B. Tierney + 1 more
journal unavailable
Report from the workshop exploring the relationship between cybersecurity and international research networking connections held in Indianapolis, IN 22-23 February, 2012.
R. A. Calix, Sumendra B. Singh, Tingyu Chen + 2 more
Inf.
This work proposes the development of a toolkit in Python that can process the most common types of cyber security data and will help cyber experts to implement a basic machine learning pipeline from beginning to end.
Trey Herr, A. Laudrain, M. Smeets
Journal of Political Science Education
It is found that few courses use the same literature, such that there is tremendous intellectual and disciplinary diversity in course content.
Charles Doyle
journal unavailable
The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA).
Prof. Pravin Patil, Ruchika Bhambure, Amar Salunke + 2 more
International Journal of Advanced Research in Science, Communication and Technology
A somewhat more robust, self reliant, and efficient cybersecurity solution that can enable higher oppportunity to each individual enterprise's evolving needs and can also quickly adjust with the constantly changing threat environment over the cyber space is introduced.
Jerzy Kosinski, Tomasz Gontarz, R. Kośla
Internal Security
It is essential to prepare appropriate procedures and personnel for the broadly understood handling of incidents violating cybersecurity, which includes protection of digital evidence according to the procedures, good practice and suggestions contained in normative documents, as well as implementing cybersecurity policy.
Don Snyder, Lauren A. Mayer, G. Weichenberg + 5 more
journal unavailable
This report presents a framework for the development of metrics -- and a method for scoring them -- that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment.
Seeking insights into cyberattacks associated with China is a regular feature in the BBC News website and is likely to be a source of contention between the US and China in the coming years.
This Article addresses the legal classification of PCSFs/SSHGs if engaging in cyber-attacks, and discusses international and domestic law as it relates to mercenaries and the role of private defense companies in modern conflicts.
A. Kasper, Anna-Maria Osula, A. Molnár
IDP Revista de Internet Derecho y Política
This article aims to map existing and proposed instruments that make up the EU’s arsenal in this broad context to answer the following questions: what is cyber diplomacy and how is it related to the EU cybersecurity?
D. Galinec, William Steingartner
2017 IEEE 14th International Scientific Conference on Informatics
How cybersecurity and cyber defense combined may lead to cyber resilience and the relationships among cybersecurity, information security, operational technology (OT) security, IT security, and other related disciplines and practices e.g. cyber defense are investigated are described.
Eleonore Beltempo, J. Rajamäki
Information & Security: An International Journal
Cybersecurity has become a critical concern for many industries, particularly in sectors that handle sensitive data and provide essential services. The healthcare industry is one such sector where the reliance on digital technologies and interconnected systems exposes institutions to a wide range of cyber threats. These threats, including ransomware, data breaches, and malicious attacks, can severely compromise patient safety, disrupt services, and erode public trust. The ECHO Cyber Skills Framework (ECHO CSF) is designed to address these challenges by providing a structured approach to enhanc...
Yiseul Cho
journal unavailable
An extended cost-benefit analysis framework is developed and applied to an in-depth case study of a Korean security agency, its Computer Emergency Response Team (CERT), and can be used for assessing international programs and activities aimed at improving cyber security, where the costs and benefits are not restricted by traditional boundaries.
G. Kumar, S. Pandey, Neeraj Varshney + 3 more
2023 IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT)
The study of cyber security involves understanding different types of cyber-attacks, their mechanisms, and the challenges that need to be overcome to stay ahead of the constantly evolving cyber threats.
Shamsad Binte Ehsan, Md. Najmus Saquib
Journal Of Creative Writing (ISSN-2410-6259)
Cybersecurity law is designed to safeguard national security and public safety. But it arguably raises a question: whose security is being emphasized? Although this act seeks to mitigate cyber risks and protect web infrastructure, in some instances, they also give governments an opportunity to control digital environments at the cost of individual liberties. This happens due to broad provisions and ambiguous phrasing in such legislation. In the name of monitoring individuals without sufficient accountability this act diverts attention from public safety to governmental authority. Therefore, go...
Hwee-Joo Kam, Yanyan Shang
journal unavailable
This study investigates how the learning of both cyber offense and cyber defense helps individuals to gain a more thorough understanding in cybersecurity concepts, and discovers that cyber offense learning cultivates effective thinking, but cyber defense engages individuals in system thinking.
C. Nobles
Cyber Warfare and Terrorism
Professional associations are the nexus of cybersecurity and possess the expertise, leadership, and sustenance to spearhead efforts to develop national-level strategies to resolve the talent gap and establish professionalization standards.
Rebecca Goolsby, L. Shanley, A. Lovell
journal unavailable
Cybersecurity efforts must take into account the growing potential for cyber-attack using social media, where hoax messages are incorporated into a stream of otherwise legitimate messages, and understand how quickly mobile apps and text services can disseminate false information.
This workshop aims to develop a research agenda for engineering cybersecurity into cyber physical systems (CPS) through designtime requirements engineering, continuous assurance at runtime, and cognitive security analytics using Watson.
Operational risks come in many guises, and the financial system as a whole pays in particular close attention to IT risks.
J. Straub
Journal of emergency management
The two disciplines of cybersecurity and emergency management are compared, areas where cybersecurity professionals and researchers can learn from the emergency management discipline are discussed and new research directions within theEmergency management domain are proposed.
Naga Satya, Praveen Kumar
journal unavailable
The landscape of cybersecurity in cloud infrastructure is explored, detailing common attack vectors, vulnerabilities, and mitigation strategies, to provide a comprehensive understanding of the threats faced by cloud infrastructure and the methods employed to secure these environments.
Carlos Solar
Journal of Cyber Policy
It is argued that in the emerging democracies, the military is on its way to being the dominant force controlling cyber centres or commands emulating those already established in the global North.
Martin Jelo, P. Helebrandt
2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)
Opportunities for hands-on cybersecurity education by using gamified scenarios in cyber range virtualized environment are explored, with emphasis on creating basic game scenario close to real-world situations.
James Shires
Contemporary Security Policy
It is argued that the concept of cyber-noir helps explain the persistence of practices that blur legal, moral, and professional lines between legitimate and malicious activity in cyberspace.
D. Shoemaker, Anne Kohnke
EDPACS
Until the solution incorporates actions that recognize and address every reasonable form of attack, the authors will never be secure, and a broad-scale educational understanding of the field must be developed based on a comprehensive definition of legitimate threats.
H. Boyes
Technology Innovation Management Review
This article examines the cyber-resilience issues related to the supply of products, services, and the supply chain infrastructure considering the nature of threats and vulnerabilities and the attributes of cybersecurity.
Sarah Backman, Tim Stevens
International Affairs
Cybersecurity in national and international security is frequently discussed in an existential register. However, most cybersecurity activities are normal and routine, including diverse practices of cyber risk management. The intricacies of cyber risk and its connection to security and threat politics have received surprisingly little attention in the cyber politics literature. This article addresses this gap through a twofold theoretical proposition. The first argues that cyber risk in policy and practice inhabits a continuum between ‘classical’ risk and security postures. The second propos...
Javier Contreras, S. Salkuti, Luiz Fernando + 3 more
Energies
This paper aims to provide a comprehensive survey of the literature on cybersecurity in cyber–physical power systems, including the concepts, architectures, and basic components that make up, as well as the vulnerabilities in managing, controlling, and protecting, a CPS.
H. Müller, Marin Litoiu, J. Mylopoulos
journal unavailable
This workshop aims to develop a research agenda for engineering cybersecurity into cyber physical systems (CPS) through design-time requirements engineering, continuous assurance at runtime, and cognitive security analytics using Watson.
배시현, Si-Hyun Bae, Dae-Woo Park
The Journal of the Korean Institute of Information and Communication Engineering
Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities
K. Nallaperumal
2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
Modern heterogeneous business world demands network access to business partners via extranet, cloud services and home-working etc makes SIEM - Security Information and Event Management into a complex and complicated task demanding deployment of Analytics tools in a big way to combat cyber crimes.
Qun Jin, Yong Xiang, Guozi Sun + 2 more
IEEE Multim.
This special issue brings together research efforts in cybersecurity for cyber-enabled multimedia applications with an urgent demand for novel technologies that deal with copyright protection, multimedia forgery detection, and cybersecurity.
Jeetendra Pande
journal unavailable
This paper attempts to investigate the current status of cyber crime at International level, National level and in Uttarakhand, and evaluates the possibility of using Massive Open Online Course (MOOCs) as an effective measure for spreading mass awareness about cyber security.
Christopher Scherb, Luc Bryan Heitz, F. Grimberg + 2 more
EPiC Series in Computing
A new type of cybersecurity game is developed and evaluated: an attack simulator, which shows the entire setting from a different perspective and explains the intention of each attack and shows the consequences of a successful attack.
A. M. Al-Hawamleh
International Journal of Advanced Computer Science and Applications
This study reviews cyber-attack types, measures and security precautions, and professional extrapolations on cyber-attacks future and the associated security measures and demonstrates prevention as key for data breach risk prevention.
Chahak Mittal
International Journal of Scientific Research and Management (IJSRM)
The study pinpointed a noteworthy vulnerability: young adult females aged 18 to 29 residing in rural Punjab, particularly those either engaged in student pursuits or currently unemployed, as disproportionately prone to cyber threats.
Keke Gai, Meikang Qiu, S. Elnagdy
2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS)
This paper addresses CI implementations focusing on cloud-based service offerings and proposes a secure cyber incident analytics framework using big data, designed for matching different cyber risk scenarios, which uses repository data.
Charles Doyle
journal unavailable
This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA), and contains some of the enhancements approved by the Senate Judiciary Committee.
Vinit A. Sinha, V. Thakare
International Journal of Computer Applications
The article ended up with implementation techniques which are sensible and more effective towards making hardening of security to cyber space.
CullinaneIan, HuangCatherine, SharkeyThomas + 1 more
Journal of Computing Sciences in Colleges
This research presents a meta-modelling system that automates the very labor-intensive and therefore time-heavy and therefore expensive and expensive process of manually cataloging and cataloging all the components of a computer game.
K. Mclaughlin
EDPACS
The role of the CPS professional is explored, highlighting the importance of continuous learning and training and investing in educational courses to fortify expertise and navigate the ever-evolving landscape of Cyber-Physical Systems.