Explore our curated collection of top research papers on Cyber Security. Dive into the latest insights and advancements in protecting information systems, networks, and data from cyber threats. This resource is perfect for academics, professionals, and anyone with an interest in understanding the evolving domain of cyber security.
Looking for research-backed answers?Try AI Search
Devorah Kletenik, Alon Butbul, Daniel Chan + 2 more
Proceedings of the 51st ACM Technical Symposium on Computer Science Education
An evaluation of the game on introductory Computer Science and Business students suggests that playing the game resulted in both short-term learning gains in cybersecurity as well as longer-term retention of the concepts.
A. Mhajne, Crystal Whetstone
International Affairs
This article draws on feminist security studies (FSS) to construct a more inclusive cybersecurity and proposes incorporating a gendered lens (an intersectional approach) to shed light on violence and insecurity online.
D. Hsu, Dorothy Marinucci, J. Voas
Computer
Cybersecurity researchers and practitioners from academia, government, and industry present emerging technologies and methodologies that effectively mitigate various cyber threats.
Miloslava Plachkinova, Stuart Steiner, Morgan Shepherd + 1 more
journal unavailable
Organizations, of all sizes and at all levels, are faced with the challenge of continuously, effectively, and efficiently protecting their systems while enabling and ensuring their mission.
S. Cheang, Sinawong Sang
2009 International Conference on Availability, Reliability and Security
The process to establish management and technical incident response capability of the national Computer Emergency Response Team to contain the on-going cyber incident is discussed.
A. Kasper, Anna-Maria Osula, A. Molnár
IDP Revista de Internet Derecho y Política
This article aims to map existing and proposed instruments that make up the EU’s arsenal in this broad context to answer the following questions: what is cyber diplomacy and how is it related to the EU cybersecurity?
A. M. Al-Hawamleh
International Journal of Advanced Computer Science and Applications
This study reviews cyber-attack types, measures and security precautions, and professional extrapolations on cyber-attacks future and the associated security measures and demonstrates prevention as key for data breach risk prevention.
Javier Contreras, S. Salkuti, Luiz Fernando + 3 more
Energies
This paper aims to provide a comprehensive survey of the literature on cybersecurity in cyber–physical power systems, including the concepts, architectures, and basic components that make up, as well as the vulnerabilities in managing, controlling, and protecting, a CPS.
Muhammad Fakhrul Safitra, M. Lubis, Hanif Fakhrurroja
Sustainability
A comprehensive framework that responds to the complexities of modern cyber threats and provides guidance to organizations to enhance their resilience, with a primary focus on the integration of capabilities with resilience.
Christine Lino
journal unavailable
Since the first cyber-attack in 1988, online viruses have proliferated through personal, organizational and government computers worldwide with devastating consequences and further reports have highlighted flaws in the country's information infrastructure that put national security, public safety and personal privacy at risk.
Christopher Scherb, Luc Bryan Heitz, F. Grimberg + 2 more
EPiC Series in Computing
A new type of cybersecurity game is developed and evaluated: an attack simulator, which shows the entire setting from a different perspective and explains the intention of each attack and shows the consequences of a successful attack.
Chahak Mittal
International Journal of Scientific Research and Management (IJSRM)
The study pinpointed a noteworthy vulnerability: young adult females aged 18 to 29 residing in rural Punjab, particularly those either engaged in student pursuits or currently unemployed, as disproportionately prone to cyber threats.
Karo Saharinen, Jaakko Backlund, Jarmo Nevala
Proceedings of the 12th International Conference on Education Technology and Computers
The research found the education heavily responding to and emphasizing Operate and Maintain and Securely Provision categories of the framework, with others being present, but with smaller ECTS (European Credit Transfer System) offering in the institutions providing higher education.
Martin Jelo, P. Helebrandt
2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)
Opportunities for hands-on cybersecurity education by using gamified scenarios in cyber range virtualized environment are explored, with emphasis on creating basic game scenario close to real-world situations.
Hakan Kayan, Matthew Nunes, O. Rana + 2 more
ACM Computing Surveys (CSUR)
A multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents and is identified the general shortcomings and highlight the points that cause a gap in existing literature while defining future research directions.
N. Mishra
Cybersecurity
It is argued that GATS art XIVbis has limited relevance, and is potentially problematic, when used in justifying majority of cybersecurity measures, and countries must avoid casually relying upon security exceptions as a basis for adopting/implementing unilateral measures on cybersecurity.
Abdullah T Alanazi
Cureus
It is imperative to prioritize cybersecurity in the healthcare industry to mitigate these risks and ensure patient confidence, health system stability, and, ultimately, save lives.
Erkeley Ukhanova
SHS Web of Conferences
Japan has come up with a complex strategy of information security, cybersecurity and cyber defence, and a key approach of the cybersecurity strategy is acting in a proactive manner while enhancing its reactive capabilities, meaning containment and sustainability capabilities accordingly.
K. Mclaughlin
EDPACS
The role of the CPS professional is explored, highlighting the importance of continuous learning and training and investing in educational courses to fortify expertise and navigate the ever-evolving landscape of Cyber-Physical Systems.
Von Welch, Doug Pearson, B. Tierney + 1 more
journal unavailable
Report from the workshop exploring the relationship between cybersecurity and international research networking connections held in Indianapolis, IN 22-23 February, 2012.
Nicolae Sfetcu
SSRN Electronic Journal
This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also explores the complexities assoc...
Simon L. R. Vrhovec, Blaz Markelj
PLOS ONE
It is uncovered that awareness of certain threats and solutions is positively associated with either adoption of advanced antimalware solutions with EDR/XDR capabilities or adoption of SOC, and significant organizational factors and personal characteristics related to cybersecurity awareness of cyber and information security decision-makers are identified.
D. Moznik, Damir Delija, Domagoj Tulčić + 1 more
ENTRENOVA - ENTerprise REsearch InNOVAtion
This research aims to create a new model of cyber resistance, which includes cyber and information security, which also considers that the methods of separating previously unseen threats and attacks of the past day are unknown today in a large number of business cases.
Majumder Haider, Imtiaz Ahmed, D. Rawat
2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN)
It is shown that the multi-layer based adaptive security approaches would be beneficial to protect UAV-a-CPS from the potential and emerging security threats effectively.
Yianna Danidou, Sara Ricci, A. Skarmeta + 3 more
Proceedings of the 18th International Conference on Availability, Reliability and Security
The most relevant and freely available tools are described and it is shown that these tools allow educators and study programme developers to map their outputs to the European Cybersecurity Framework developed by the ENISA and other similar frameworks.
Trey Herr, A. Laudrain, M. Smeets
Journal of Political Science Education
It is found that few courses use the same literature, such that there is tremendous intellectual and disciplinary diversity in course content.
Prof. Pravin Patil, Ruchika Bhambure, Amar Salunke + 2 more
International Journal of Advanced Research in Science, Communication and Technology
A somewhat more robust, self reliant, and efficient cybersecurity solution that can enable higher oppportunity to each individual enterprise's evolving needs and can also quickly adjust with the constantly changing threat environment over the cyber space is introduced.
Keren L. G. Snider, Ryan Shandler, Shay Zandani + 1 more
J. Cybersecur.
It is suggested that peoples’ willingness to accept government cybersecurity policies that limit personal civil liberties and privacy depends on the type of cyberattacks to which they were exposed and the perceptions associated with such exposure.
T. Zaware
International Research Journal of Modernization in Engineering Technology and Science
The cyber kill chain may be a blueprint for in operation in an exceedingly staged manner, that incident response groups, forensics consultants, and malware researchers will use to notice and stop cyberattacks at completely different stages of the chain.
L. Bygrave
2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)
The paper’s underlying message is that cyber resilience ought not to take priority over cybersecurity as a public policy goal; rather, both goals ought to be met.
B. Scott, Raina Mason
Journal of The Colloquium for Information Systems Security Education
It is demonstrated that EAL cybersecurity students express challenges with aspects of cybersecurity content and it is shown that predominant cybersecurity education bodies of knowledge and frameworks do not address challenges faced by Eal cybersecurity students.
Charles Doyle
journal unavailable
The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA).
Don Snyder, Lauren A. Mayer, G. Weichenberg + 5 more
journal unavailable
This report presents a framework for the development of metrics -- and a method for scoring them -- that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment.
E. Carayannis, E. Grigoroudis, S. Rehman + 1 more
IEEE Transactions on Engineering Management
This paper suggests that the Quadruple/Quintuple Helix Innovation model may promote AMBI-CYBER enabling a locus-centric and triple-bottom-line-centric entrepreneurial process of discovery followed by development, exploration, exploitation, and deployment.
Jerzy Kosinski, Tomasz Gontarz, R. Kośla
Internal Security
It is essential to prepare appropriate procedures and personnel for the broadly understood handling of incidents violating cybersecurity, which includes protection of digital evidence according to the procedures, good practice and suggestions contained in normative documents, as well as implementing cybersecurity policy.
Baofeng Ji, Yanan Wang, Ling Xing + 3 more
IEEE Transactions on Network Science and Engineering
The modelling in this paper considers the situation where communication over multiple-input single-output channel is eavesdropped by a patient spy holding a single antenna receiver, and additionally the patient spy is obscured by an obstacle and verifies that the introduction of IRS can effectively improve the privacy security of medical data.
D. Galinec, William Steingartner
2017 IEEE 14th International Scientific Conference on Informatics
How cybersecurity and cyber defense combined may lead to cyber resilience and the relationships among cybersecurity, information security, operational technology (OT) security, IT security, and other related disciplines and practices e.g. cyber defense are investigated are described.
Aastha Verma, C. Shri
Vision: The Journal of Business Perspective
An attempt has been made to generate a protection framework from these cyberattacks, representing its linkages with possible security solutions and control measures through a systematic stepwise process of investigation.
Seeking insights into cyberattacks associated with China is a regular feature in the BBC News website and is likely to be a source of contention between the US and China in the coming years.
Bhumika Tuli, Santosh Kumar, N. Gautam
Asian Journal of Engineering and Applied Technology
Overall, this article gives an intensive overview regarding cyber crime, the work of criminals and the cyber security and because of it how to prevent the cybercrime and make it secure, as new technology is there that comes up with new ideas to protect human life.
This Article addresses the legal classification of PCSFs/SSHGs if engaging in cyber-attacks, and discusses international and domestic law as it relates to mercenaries and the role of private defense companies in modern conflicts.
V. A. Dokuchaev, V. V. Maklachkova
2023 International Conference on Engineering Management of Communication and Technology (EMCTECH)
The work examines the main subjects and cyber risks in a transport company, as well as an approach to constructing an analytical model for assessing the effectiveness of the transport company's information system in order to assess the risks of unauthorized access and distortion of personal data of passengers, employees and clients of the Transport Company.
M. Ferrag, A. Battah, Norbert Tihanyi + 3 more
ArXiv
This paper introduces SecureFalcon, an innovative model architecture built upon FalconLLM that achieved an impressive 94 % accuracy rate in detecting software vulnerabilities, emphasizing its significant potential to redefine software vulnerability detection methods in cybersecurity.
Srinivas Katkuri
Indian Journal of Public Administration
The study elucidates how cybersecurity, enshrined in the Information Technology Act, 2000, is crucial for thwarting unauthorised accesses and breaches, given its potential ramifications for national security and economic stability.
Shamsad Binte Ehsan, Md. Najmus Saquib
Journal Of Creative Writing (ISSN-2410-6259)
The need for amendments to harmonize Bangladesh’s cybersecurity legislation with international norms is indicated, and various worldwide cybersecurity frameworks are compared to evaluate how Bangladesh’s cybersecurity laws may inadvertently impede individual rights.
Dr. S. Gopinath, Mr. M. Hemanand, Mr. P. Arunprasath + 3 more
International Research Journal on Advanced Engineering and Management (IRJAEM)
The paper points to the weaknesses brought about by the integration of IT and OT systems in the maritime sector, illustrated with high-profile incidents like the NotPetya attack on Maersk and the cyber breach at the Port of Antwerp, and calls for the establishment of sound cybersecurity frameworks in maritime operations.
G. Kumar, S. Pandey, Neeraj Varshney + 3 more
2023 IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT)
The study of cyber security involves understanding different types of cyber-attacks, their mechanisms, and the challenges that need to be overcome to stay ahead of the constantly evolving cyber threats.
Liat Wasserman, Yair Wasserman
Frontiers in Digital Health
Comparing the risks, strategies, and gaps revealed that many US hospitals are unprepared for cyberattacks, including primary reasons hospitals are frequent targets, top attack methods, and consequences hospitals face following attacks.
Carlos Solar
Journal of Cyber Policy
It is argued that in the emerging democracies, the military is on its way to being the dominant force controlling cyber centres or commands emulating those already established in the global North.
Mr. Shubham Gautam, Mr. Pramod Yadav, Mr. Rishabh Thakur + 2 more
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
The authors' online superhero is cybersecurity, the cybersecurity that allows us to surf the web, play games, and chat with friends securely, and be a bit more careful when clicking on links in emails from strangers.