A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …
Given the global increase in crippling cyberattacks, organizations are increasingly turning to
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …
Analysis of current preventive approaches in the context of cybersecurity
ME Oka, M Hromada - 2022 IEEE International Carnahan …, 2022 - ieeexplore.ieee.org
Reliance on information technology and computer network solutions is on the increase, so
are the activities of cyber criminals, the number of cyber-attacks and the impact. According to …
are the activities of cyber criminals, the number of cyber-attacks and the impact. According to …
Enhancing Network Security in Mobile Applications with Role-Based Access Control
In today's dynamic networking environment, securing access to resources has become
increasingly challenging due to the growth and progress of connected devices. This study …
increasingly challenging due to the growth and progress of connected devices. This study …
Device-type profiling for network access control systems using clustering-based multivariate Gaussian outlier score
Behaviour profiling is used in organisations to identify the working patterns of agents:
humans or devices. It can be used to detect abnormal patterns of devices in an …
humans or devices. It can be used to detect abnormal patterns of devices in an …
Performance of a security control scheme for a health data exchange system
We propose an access control scheme to improve the security of a cross border health data
access running under distributed systems such as OpenNCP that cooperate through …
access running under distributed systems such as OpenNCP that cooperate through …
A novel deep learning based security assessment framework for enhanced security in swarm network environment
Z Liu, J Zheng, S Wang, A Muhammad - International Journal of Critical …, 2022 - Elsevier
Security assessments are essential in network systems to improve the reliability of the
environment. This study presents a deep learning-based security assessment model as a …
environment. This study presents a deep learning-based security assessment model as a …
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls.
JH Park, SC Park, HY Youm - Applied Sciences (2076-3417 …, 2025 - search.ebscohost.com
The rapid advancement of technology and increasing data utilisation have underscored the
need for new models to manage and secure big data effectively. However, the constraints of …
need for new models to manage and secure big data effectively. However, the constraints of …
[PDF][PDF] Contextual security with IF-MAP
A Lakbabi, G Orhanou, S El Hajji - International Journal of Security …, 2014 - academia.edu
The multi-context attacks are serious challenges to security detection process. Actually, each
security solution produces a considerable number of security events, heterogeneous and …
security solution produces a considerable number of security events, heterogeneous and …
Network access control and collaborative security against APT and AET
G Orhanou, A Lakbabi, N Moukafih… - Security and Privacy in …, 2018 - igi-global.com
Cybercrime is rising due to the appearance of a new generation of attacks, APT and AET,
and the reactionary aspect of the protection systems implemented in the IP networks. In this …
and the reactionary aspect of the protection systems implemented in the IP networks. In this …
Network security management and implementation based on ACL
M Feng - … Conference on Applications and Techniques in Cyber …, 2019 - Springer
At present, small and medium-sized enterprises demand for the confidentiality of the
information network is more and more high, in view of the network protection company to …
information network is more and more high, in view of the network protection company to …