|
|
|
Amthal K. Mousa and Mohammed Najm Abdullah
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN?s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data cent...
ver más
|
|
|
|
|
|
|
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f...
ver más
|
|
|
|
|
|
|
Ahmed A. Abdullah, B. M. El-den, Khaled M. Abo-Al-Ez and Tarek M. Hassan
Advanced Metering Infrastructure (AMI) plays a crucial role in enabling the efficient functioning of Smart Electrical Grids, but its successful implementation hinges on robust cybersecurity measures. To uphold data confidentiality and integrity, the depl...
ver más
|
|
|
|
|
|
|
Mohammad Mustafa Taye
In recent years, deep learning (DL) has been the most popular computational approach in the field of machine learning (ML), achieving exceptional results on a variety of complex cognitive tasks, matching or even surpassing human performance. Deep learnin...
ver más
|
|
|
|
|
|
|
Mario A. Leiva, Alejandro J. García, Paulo Shakarian and Gerardo I. Simari
Decision support tools are key components of intelligent sociotechnical systems, and their successful implementation faces a variety of challenges, including the multiplicity of information sources, heterogeneous format, and constant changes. Handling su...
ver más
|
|
|
|
|
|
|
Serhii Yevseiev,Oleksandr Milov,Stanislav Milevskyi,Oleksandr Voitko,Maksym Kasianenko,Yevgen Melenti,Serhii Pohasii,Hrygorii Stepanov,Oleksandr Turinskyi,Serhii Faraon
Pág. 15 - 29
A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of deci...
ver más
|
|
|
|
|
|
|
Konstantinos Demertzis, Panayiotis Kikiras, Nikos Tziritas, Salvador Llopis Sanchez and Lazaros Iliadis
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SO...
ver más
|
|
|
|
|
|
|
Melissa Carlton, Yair Levy
Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or...
ver más
|
|
|
|