The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

Fundamental concepts of cyber resilience: Introduction and overview

I Linkov, A Kott - Cyber resilience of systems and networks, 2019 - Springer
Society is increasingly reliant upon complex and interconnected cyber systems to conduct
daily life activities. From personal finance to managing defense capabilities to controlling a …

User behavior based insider threat detection using a multi fuzzy classifier

M Singh, BM Mehtre, S Sangeetha - Multimedia Tools and Applications, 2022 - Springer
Insider threats are a significant source of security breaches in organizations. They are often
identified using machine and deep learning methods. These methods rely on predefined …

SoK: Contemporary issues and challenges to enable cyber situational awareness for network security

M Husák, T Jirsík, SJ Yang - … of the 15th International Conference on …, 2020 - dl.acm.org
Cyber situational awareness is an essential part of cyber defense that allows the
cybersecurity operators to cope with the complexity of today's networks and threat …

Predicting cyber-events by leveraging hacker sentiment

A Deb, K Lerman, E Ferrara - Information, 2018 - mdpi.com
Recent high-profile cyber-attacks exemplify why organizations need better cyber-defenses.
Cyber-threats are hard to accurately predict because attackers usually try to mask their …

Simulation of authentication in information-processing electronic devices based on poisson pulse sequence generators

V Maksymovych, E Nyemkova, C Justice, M Shabatura… - Electronics, 2022 - mdpi.com
Poisson pulse sequence generators are quite well studied, have good statistical properties,
are implemented both in software and hardware, but have not yet been used for the purpose …

Combining switching mechanism with re-initialization and anomaly detection for resiliency of cyber–physical systems

H Fu, P Krishnamurthy, F Khorrami - Automatica, 2025 - Elsevier
Cyber–physical systems (CPS) play a pivotal role in numerous critical real-world
applications that have stringent requirements for safety. To enhance the CPS resiliency …

[書籍][B] Cyber resilience

S Petrenko - 2022 - taylorfrancis.com
Modern cyber systems acquire more emergent system properties, as far as their complexity
increases: cyber resilience, controllability, self-organization, proactive cyber security and …

On the security of cyber-physical systems against stochastic cyber-attacks models

QA Al-Haija - 2021 IEEE International IoT, Electronics and …, 2021 - ieeexplore.ieee.org
Cyber Physical Systems (CPS) are widely deployed and employed in many recent real
applications such as automobiles with sensing technology for crashes to protect …

A multivariate model to quantify and mitigate cybersecurity risk

M Bentley, A Stephenson, P Toscas, Z Zhu - Risks, 2020 - mdpi.com
The cost of cybersecurity incidents is large and growing. However, conventional methods for
measuring loss and choosing mitigation strategies use simplifying assumptions and are …