The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
Fundamental concepts of cyber resilience: Introduction and overview
Society is increasingly reliant upon complex and interconnected cyber systems to conduct
daily life activities. From personal finance to managing defense capabilities to controlling a …
daily life activities. From personal finance to managing defense capabilities to controlling a …
User behavior based insider threat detection using a multi fuzzy classifier
Insider threats are a significant source of security breaches in organizations. They are often
identified using machine and deep learning methods. These methods rely on predefined …
identified using machine and deep learning methods. These methods rely on predefined …
SoK: Contemporary issues and challenges to enable cyber situational awareness for network security
Cyber situational awareness is an essential part of cyber defense that allows the
cybersecurity operators to cope with the complexity of today's networks and threat …
cybersecurity operators to cope with the complexity of today's networks and threat …
Predicting cyber-events by leveraging hacker sentiment
Recent high-profile cyber-attacks exemplify why organizations need better cyber-defenses.
Cyber-threats are hard to accurately predict because attackers usually try to mask their …
Cyber-threats are hard to accurately predict because attackers usually try to mask their …
Simulation of authentication in information-processing electronic devices based on poisson pulse sequence generators
V Maksymovych, E Nyemkova, C Justice, M Shabatura… - Electronics, 2022 - mdpi.com
Poisson pulse sequence generators are quite well studied, have good statistical properties,
are implemented both in software and hardware, but have not yet been used for the purpose …
are implemented both in software and hardware, but have not yet been used for the purpose …
Combining switching mechanism with re-initialization and anomaly detection for resiliency of cyber–physical systems
Cyber–physical systems (CPS) play a pivotal role in numerous critical real-world
applications that have stringent requirements for safety. To enhance the CPS resiliency …
applications that have stringent requirements for safety. To enhance the CPS resiliency …
[書籍][B] Cyber resilience
S Petrenko - 2022 - taylorfrancis.com
Modern cyber systems acquire more emergent system properties, as far as their complexity
increases: cyber resilience, controllability, self-organization, proactive cyber security and …
increases: cyber resilience, controllability, self-organization, proactive cyber security and …
On the security of cyber-physical systems against stochastic cyber-attacks models
QA Al-Haija - 2021 IEEE International IoT, Electronics and …, 2021 - ieeexplore.ieee.org
Cyber Physical Systems (CPS) are widely deployed and employed in many recent real
applications such as automobiles with sensing technology for crashes to protect …
applications such as automobiles with sensing technology for crashes to protect …
A multivariate model to quantify and mitigate cybersecurity risk
The cost of cybersecurity incidents is large and growing. However, conventional methods for
measuring loss and choosing mitigation strategies use simplifying assumptions and are …
measuring loss and choosing mitigation strategies use simplifying assumptions and are …