Cyber threat detection using machine learning techniques: A performance evaluation perspective

K Shaukat, S Luo, S Chen, D Liu - … international conference on …, 2020 - ieeexplore.ieee.org
The present-day world has become all dependent on cyberspace for every aspect of daily
living. The use of cyberspace is rising with each passing day. The world is spending more …

Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods

KU Sarker, F Yunus, A Deraman - Sustainability, 2023 - mdpi.com
Cyber attackers are becoming smarter, and at the end of the day, many novel attacks are
hosted in the cyber world. Security issues become more complex and critical when the …

Deterrence in the cyber realm: Public versus private cyber capacity

N Kostyuk - International Studies Quarterly, 2021 - academic.oup.com
Can cyber deterrence work? Existing scholarly works argue that deterrence by punishment
using cyberattacks is ineffective because the difficulty of attributing the origin of cyberattacks …

All Hands on Tech: Effectively Addressing Maritime Operational Technology Risks Through Cybersecurity Awareness Training

E D'Amelio, S Abuzneid - 2024 IEEE Long Island Systems …, 2024 - ieeexplore.ieee.org
The maritime industry is a vital part of the United States economy, with over ninety percent of
the importation and exportation of goods conducted by water. As vessels have become more …

A Novel Approach for Cyber Threat Detection Based on Angle-Based Subspace Anomaly Detection

TR Soumya, S Revathy - Cybernetics and Systems, 2022 - Taylor & Francis
In real time applications related to social media, conventional anomaly detection techniques
are not applicable as the accuracy is degraded due to higher dimensionality thereby …

Public Cyberinstitutions: Signaling State Cybercapacity

N Kostyuk - 2020 - deepblue.lib.umich.edu
Even though there has been a rapid increase in state cybercapacity over the last two
decades, researchers have paid little attention to this phenomenon. In my dissertation Public …

Cybersecurity Awareness, and Cybersecurity Behavior of High School Students in Davao City: A Mediation Role of Perceived Behavioral Control

NBB Booc, K Budiongan, R Carballo - European Journal of Applied …, 2024 - ejaset.com
This study aims to determine the mediating effect of perceived behavioral control in the
relationship between cybersecurity awareness and cybersecurity behavior of high school …

Public Confidence Following Lethal and Financial Conventional and Cyber Terror: Survey Experiments in Trilateral Democracies

S Matzkin - 2020 - search.proquest.com
What psychological mechanisms drive public confidence in government institutions in the
aftermath of cyber terror? While scholarly literature has explored the security and deterrence …

Cyber Threat Detection Based On Angle-Based Subspace Anomaly For Machine Learning Applications

TR Soumya, S Revathy - 2022 - researchsquare.com
In real time applications related to social media, conventional anomaly detection techniques
are not applicable as the accuracy is degraded due to higher dimensionality thereby …

[PDF][PDF] EXPLORING CYBERSECURITY MINDSETS: A COMPARATIVE ANALYSIS OF AGE, LEADERSHIP, WORK EXPERIENCE AND EXPERTISE

G Eibl, O Litvyak - MCCSIS 2024 - research.tue.nl
The frequency of cybersecurity threats is on the rise, underscoring the need for individuals
and organisations to adopt proactive measures to safeguard their sensitive information. The …