A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …

B Shin, PB Lowry - Computers & Security, 2020 - Elsevier
Given the global increase in crippling cyberattacks, organizations are increasingly turning to
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …

Analysis of current preventive approaches in the context of cybersecurity

ME Oka, M Hromada - 2022 IEEE International Carnahan …, 2022 - ieeexplore.ieee.org
Reliance on information technology and computer network solutions is on the increase, so
are the activities of cyber criminals, the number of cyber-attacks and the impact. According to …

Enhancing Network Security in Mobile Applications with Role-Based Access Control

E Mpamugo, G Ansa - Journal of Information Systems and Informatics, 2024 - journal-isi.org
In today's dynamic networking environment, securing access to resources has become
increasingly challenging due to the growth and progress of connected devices. This study …

Device-type profiling for network access control systems using clustering-based multivariate Gaussian outlier score

M Muhammad, U Daniel Ani, AA Abdullahi… - Proceedings of the 5th …, 2021 - dl.acm.org
Behaviour profiling is used in organisations to identify the working patterns of agents:
humans or devices. It can be used to detect abnormal patterns of devices in an …

Performance of a security control scheme for a health data exchange system

E Gelenbe, M Pavloski - 2020 IEEE International Black Sea …, 2020 - ieeexplore.ieee.org
We propose an access control scheme to improve the security of a cross border health data
access running under distributed systems such as OpenNCP that cooperate through …

A novel deep learning based security assessment framework for enhanced security in swarm network environment

Z Liu, J Zheng, S Wang, A Muhammad - International Journal of Critical …, 2022 - Elsevier
Security assessments are essential in network systems to improve the reliability of the
environment. This study presents a deep learning-based security assessment model as a …

A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls.

JH Park, SC Park, HY Youm - Applied Sciences (2076-3417 …, 2025 - search.ebscohost.com
The rapid advancement of technology and increasing data utilisation have underscored the
need for new models to manage and secure big data effectively. However, the constraints of …

[PDF][PDF] Contextual security with IF-MAP

A Lakbabi, G Orhanou, S El Hajji - International Journal of Security …, 2014 - academia.edu
The multi-context attacks are serious challenges to security detection process. Actually, each
security solution produces a considerable number of security events, heterogeneous and …

Network access control and collaborative security against APT and AET

G Orhanou, A Lakbabi, N Moukafih… - Security and Privacy in …, 2018 - igi-global.com
Cybercrime is rising due to the appearance of a new generation of attacks, APT and AET,
and the reactionary aspect of the protection systems implemented in the IP networks. In this …

Network security management and implementation based on ACL

M Feng - … Conference on Applications and Techniques in Cyber …, 2019 - Springer
At present, small and medium-sized enterprises demand for the confidentiality of the
information network is more and more high, in view of the network protection company to …