期刊文献+
共找到1,197篇文章
< 1 2 60 >
每页显示 20 50 100
Cybersecurity Research-Essential to a Successful Digital Future 被引量:1
1
作者 Jackie Craig 《Engineering》 2018年第1期9-10,共2页
The ability of technology to profoundly affect our lives is exem- plified by the digital transformation that is occurring in many aspects of our lives and being played out in the virtual world of cyberspace. Cyberspac... The ability of technology to profoundly affect our lives is exem- plified by the digital transformation that is occurring in many aspects of our lives and being played out in the virtual world of cyberspace. Cyberspace provides unparalleled connectivity and glo- bal reach, and is central to societal and economic well-being. 展开更多
关键词 cybersecurity research-essential SUCCESSFUL DIGITAL FUTURE
在线阅读 下载PDF
Cybersecurity Challenges and Technological Integration in Military Supply Chain 4.0 被引量:1
2
作者 Nathalie Essi Afefa Takpah Victor Nosakhare Oriakhi 《Journal of Information Security》 2025年第1期131-148,共18页
The concept of Supply Chain 4.0 represents a transformative phase in supply chain management through advanced digital technologies like IoT, AI, blockchain, and cyber-physical systems. While these innovations deliver ... The concept of Supply Chain 4.0 represents a transformative phase in supply chain management through advanced digital technologies like IoT, AI, blockchain, and cyber-physical systems. While these innovations deliver operational improvements, the heightened interconnectivity introduces significant cybersecurity challenges, particularly within military logistics, where mission-critical operations and life-safety concerns are paramount. This paper examines these unique cybersecurity requirements, focusing on advanced persistent threats, supply chain poisoning, and data breaches that could compromise sensitive operations. The study proposes a hybrid cybersecurity framework tailored to military logistics, integrating resilience, redundancy, and cross-jurisdictional security measures. Real-world applicability is validated through simulations, offering strategies for securing supply chains while balancing security, efficiency, and flexibility. 展开更多
关键词 cybersecurity Supply Chain IOT BlockChain Artificial Intelligence
在线阅读 下载PDF
Assessing the Gaps in Cybersecurity Resilience in Cameroon: Challenges and Opportunities for Strengthening National Cybersecurity Frameworks
3
作者 Eyong Atem 《Journal of Computer and Communications》 2025年第2期191-206,共16页
The digital transformation in Cameroon presents critical cybersecurity challenges that demand immediate attention and strategic intervention. This comprehensive analysis examines the evolving cybersecurity landscape i... The digital transformation in Cameroon presents critical cybersecurity challenges that demand immediate attention and strategic intervention. This comprehensive analysis examines the evolving cybersecurity landscape in Cameroon from 2020 to 2023, during which cyber-attacks increased by 156% and financial losses from digital fraud exceeded $45 million. This research identifies significant vulnerabilities in Cameroon’s cybersecurity ecosystem through a rigorous assessment of national infrastructure, policy frameworks, and institutional capacities. Recent data indicates that while digital service adoption has grown exponentially, with internet penetration reaching 35.2% in 2023, cybersecurity measures have lagged significantly behind international standards. This analysis draws on comprehensive data from multiple sectors, including financial services, government institutions, and telecommunications, incorporating findings from the National Cybersecurity Assessment Program and the Digital Infrastructure Security Report. The research reveals that 73% of organizations lack dedicated security teams, while response times to cyber incidents average 72 hours—three times than the global standard. Based on these findings, this paper proposes evidence-based solutions for enhancing digital resilience, including policy modernization, capacity-building initiatives, and technical infrastructure development. The recommendations encompass short-term tactical responses, medium-term strategic improvements, and long-term structural changes, providing a comprehensive roadmap for strengthening Cameroon’s national cybersecurity frameworks. 展开更多
关键词 Cameroon cybersecurity Gaps Sub-Sahara Africa cybersecurity ANTIC CAMTEL CNPS cybersecurity Threats AFRICA
在线阅读 下载PDF
A Web Platform Based on the NIST CSF for Assessing and Monitoring the Cybersecurity of SMEs and Critical Infrastructures
4
作者 Mohamadou Konate Pegdwinde Justin Kouraogo Omar Hamidou Harouna 《Open Journal of Applied Sciences》 2025年第1期274-284,共11页
The NIST Cybersecurity Framework (NIST CSF) serves as a voluntary guideline aimed at helping organizations, tiny and medium-sized enterprises (SMEs), and critical infrastructure operators, effectively manage cyber ris... The NIST Cybersecurity Framework (NIST CSF) serves as a voluntary guideline aimed at helping organizations, tiny and medium-sized enterprises (SMEs), and critical infrastructure operators, effectively manage cyber risks. Although comprehensive, the complexity of the NIST CSF can be overwhelming, especially for those lacking extensive cybersecurity resources. Current implementation tools often cater to larger companies, neglecting the specific needs of SMEs, which can be vulnerable to cyber threats. To address this gap, our research proposes a user-friendly, open-source web platform designed to simplify the implementation of the NIST CSF. This platform enables organizations to assess their risk exposure and continuously monitor their cybersecurity maturity through tailored recommendations based on their unique profiles. Our methodology includes a literature review of existing tools and standards, followed by a description of the platform’s design and architecture. Initial tests with SMEs in Burkina Faso reveal a concerning cybersecurity maturity level, indicating the urgent need for improved strategies based on our findings. By offering an intuitive interface and cross-platform accessibility, this solution aims to empower organizations to enhance their cybersecurity resilience in an evolving threat landscape. The article concludes with discussions on the practical implications and future enhancements of the tool. 展开更多
关键词 cybersecurity NIST CSF Framework cybersecurity Assessment Tool cybersecurity Mitigation Small and Medium-Sized Enterprises Critical Infrastructure
在线阅读 下载PDF
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
5
作者 Anastasios Papathanasiou George Liontos +2 位作者 Athanasios Katsouras Vasiliki Liagkou Euripides Glavas 《Journal of Information Security》 2025年第1期1-43,共43页
Small and Medium-sized Enterprises (SMEs) are considered the backbone of global economy, but they often face cyberthreats which threaten their financial stability and operational continuity. This work aims to offer a ... Small and Medium-sized Enterprises (SMEs) are considered the backbone of global economy, but they often face cyberthreats which threaten their financial stability and operational continuity. This work aims to offer a proactive cybersecurity approach to safeguard SMEs against these threats. Furthermore, to mitigate these risks, we propose a comprehensive framework of practical and scalable cybersecurity measurements/protocols specifically for SMEs. These measures encompass a spectrum of solutions, from technological fortifications to employee training initiatives and regulatory compliance strategies, in an effort to cultivate resilience and awareness among SMEs. Additionally, we introduce a specially designed a Java-based questionnaire software tool in order to provide an initial framework for essential cybersecurity measures and evaluation for SMEs. This tool covers crucial topics such as social engineering and phishing attempts, implementing antimalware and ransomware defense mechanisms, secure data management and backup strategies and methods for preventing insider threats. By incorporating globally recognized frameworks and standards like ISO/IEC 27001 and NIST guidelines, this questionnaire offers a roadmap for establishing and enhancing cybersecurity measures. 展开更多
关键词 cybersecurity CYBERCRIME SMEs (Small and Medium-Sized Enterprises) Risk Management Ransomware PHISHING Social Engineering MALWARE
在线阅读 下载PDF
The Cyberpsychology of Small and Medium-Sized Enterprises Cybersecurity: A Human-Centric Approach to Policy Development
6
作者 Troy C. Troublefield 《Journal of Information Security》 2025年第1期158-183,共26页
This study investigates the critical intersection of cyberpsychology and cybersecurity policy development in small and medium-sized enterprises (SMEs). Through a mixed-methods approach incorporating surveys of 523 emp... This study investigates the critical intersection of cyberpsychology and cybersecurity policy development in small and medium-sized enterprises (SMEs). Through a mixed-methods approach incorporating surveys of 523 employees across 78 SMEs, qualitative interviews, and case studies, the research examines how psychological factors influence cybersecurity behaviors and policy effectiveness. Key findings reveal significant correlations between psychological factors and security outcomes, including the relationship between self-efficacy and policy compliance (r = 0.42, p β = 0.37, p < 0.001). The study identifies critical challenges in risk perception, policy complexity, and organizational culture affecting SME cybersecurity implementation. Results demonstrate that successful cybersecurity initiatives require the integration of psychological principles with technical solutions. The research provides a framework for developing human-centric security policies that address both behavioral and technical aspects of cybersecurity in resource-constrained environments. 展开更多
关键词 Cyberpsychology cybersecurity SMES Policy Development Human Factors Risk Perception Compliance Behavior Organizational Culture Psychological Resilience Security Awareness
在线阅读 下载PDF
Multi-objective Markov-enhanced adaptive whale optimization cybersecurity model for binary and multi-class malware cyberthreat classification
7
作者 Saif Ali Abd Alradha Alsaidi Riyadh Rahef Nuiaa Al Ogaili +3 位作者 Zaid Abdi Alkareem Alyasseri Dhiah Al-Shammary Ayman Ibaida Adam Slowik 《Journal of Electronic Science and Technology》 2025年第4期95-112,共18页
The rapid and increasing growth in the volume and number of cyber threats from malware is not a real danger;the real threat lies in the obfuscation of these cyberattacks,as they constantly change their behavior,making... The rapid and increasing growth in the volume and number of cyber threats from malware is not a real danger;the real threat lies in the obfuscation of these cyberattacks,as they constantly change their behavior,making detection more difficult.Numerous researchers and developers have devoted considerable attention to this topic;however,the research field has not yet been fully saturated with high-quality studies that address these problems.For this reason,this paper presents a novel multi-objective Markov-enhanced adaptive whale optimization(MOMEAWO)cybersecurity model to improve the classification of binary and multi-class malware threats through the proposed MOMEAWO approach.The proposed MOMEAWO cybersecurity model aims to provide an innovative solution for analyzing,detecting,and classifying the behavior of obfuscated malware within their respective families.The proposed model includes three classification types:Binary classification and multi-class classification(e.g.,four families and 16 malware families).To evaluate the performance of this model,we used a recently published dataset called the Canadian Institute for Cybersecurity Malware Memory Analysis(CIC-MalMem-2022)that contains balanced data.The results show near-perfect accuracy in binary classification and high accuracy in multi-class classification compared with related work using the same dataset. 展开更多
关键词 Malware cybersecurity attacks Malware detection and classification Markov chain MULTI-OBJECTIVE MOMEAWO cybersecurity model
在线阅读 下载PDF
Exploration and Practice of General Education Courses on Cybersecurity in Higher Education Institutions
8
作者 Xuejing Zhang Yueqin Li +1 位作者 Fang Yang Jingjing Wu 《Journal of Contemporary Educational Research》 2025年第11期306-310,共5页
Strengthening cybersecurity education for college students holds significant importance in achieving the strategic goal of building China into a cyber power.This article begins by discussing the significance and neces... Strengthening cybersecurity education for college students holds significant importance in achieving the strategic goal of building China into a cyber power.This article begins by discussing the significance and necessity of implementing cybersecurity education for university students.Drawing on disciplinary characteristics and student learning analysis,it presents a comprehensive construction process and countermeasures for a general cybersecurity education course,covering aspects such as teaching content development,teaching resource creation,and pedagogical approaches.The aim is to provide reference and guidance for other universities in developing general cybersecurity education courses. 展开更多
关键词 cybersecurity General education Security awareness
在线阅读 下载PDF
Analysis on BRICS Cybersecurity,New E-Commerce Platforms,and Digital Sovereignty:A Case Study of China and Pakistan
9
作者 Lingbin Zhou 《Journal of Electronic Research and Application》 2025年第5期225-232,共8页
Taking the cooperation between China and Pakistan as an example,this paper expounds on the current situation,governance concept,obstacles to cooperation,and differentiated policies of Western countries in the areas of... Taking the cooperation between China and Pakistan as an example,this paper expounds on the current situation,governance concept,obstacles to cooperation,and differentiated policies of Western countries in the areas of cybersecurity,the role of new e-commerce platforms,and digital sovereignty of BRICS countries.It aims to promote inter-governmental cooperation through civil dialogue and lead information technology cooperation among developing countries through the BRICS mechanism,as well as to collaborate to establish guidelines for global cybersecurity,new e-commerce platforms,and digital sovereignty. 展开更多
关键词 BRICS cybersecurity New e-commerce platform Digital sovereignty
在线阅读 下载PDF
Fortifying Industry 4.0 Solar Power Systems:A Blockchain-Driven Cybersecurity Framework with Immutable LightGBM
10
作者 Asrar Mahboob Muhammad Rashad +3 位作者 Ghulam Abbas Zohaib Mushtaq Tehseen Mazhar Ateeq Ur Rehman 《Computers, Materials & Continua》 2025年第11期3805-3823,共19页
This paper presents a novel blockchain-embedded cybersecurity framework for industrial solar power systems,integrating immutable machine learning(ML)with distributed ledger technology.Our contribution focused on three... This paper presents a novel blockchain-embedded cybersecurity framework for industrial solar power systems,integrating immutable machine learning(ML)with distributed ledger technology.Our contribution focused on three factors,Quantum-resistant feature engineering using theUNSW-NB15 dataset adapted for solar infrastructure anomalies.An enhanced Light Gradient Boosting Machine(LightGBM)classifier with blockchain-validated decision thresholds,and A cryptographic proof-of-threat(PoT)consensus mechanism for cyber attack verification.The proposed Immutable LightGBM model with majority voting and cryptographic feature encoding achieves 96.9% detection accuracy with 0.97 weighted average of precision,recall and F1-score,outperforming conventional intrusion detection systems(IDSs)by 12.7% in false positive reduction.The blockchain layer demonstrates a 2.4-s average block confirmation time with 256-bit SHA-3 hashing,enabling real-time threat logging in photovoltaic networks.Experimental results improve in attack traceability compared to centralized security systems,establishing new benchmarks for trustworthy anomaly detection in smart grid infrastructures.This study also compared traditional and hybrid ML based blockchian driven IDSs and attained better classification results.The proposed framework not only delivers a resilient,adaptable threat mitigation system(TMS)for Industry 4.0 solar powered infrastructure but also attains high explainability,scalability with tamper-proof logs,and remarkably exceptional ability of endurance to cyber attacks. 展开更多
关键词 Blockchain LightGBM solar cybersecurity industrial IoT threat intelligence
在线阅读 下载PDF
Striding towards a safer cyberspace:Cybersecurity Standardization Conference 2025 held in Belgium
11
作者 Fang Luofan 《China Standardization》 2025年第3期46-49,共4页
The European Standardization Organizations(ESOs),CEN,CENELEC and ETSI,joined forces with ENISA,the EU Agency for Cybersecurity,to host the 9th Cybersecurity Standardization Conference on March 20 in Brussels,Belgium.
关键词 cenelec CONFERENCE STANDARDIZATION ETSI cybersecurity belgium European Standardization Organizations cen
原文传递
Enhancing Healthcare Cybersecurity through the Development and Evaluation of Intrusion Detection Systems
12
作者 Muhammad Usama Arshad Aziz +4 位作者 Imtiaz Hassan Shynar Akhmetzhanova Sultan Noman Qasem Abdullah M.Albarrak Tawfik Al-Hadhrami 《Computer Modeling in Engineering & Sciences》 2025年第7期1225-1248,共24页
The increasing reliance on digital infrastructure in modern healthcare systems has introduced significant cybersecurity challenges,particularly in safeguarding sensitive patient data and maintaining the integrity of m... The increasing reliance on digital infrastructure in modern healthcare systems has introduced significant cybersecurity challenges,particularly in safeguarding sensitive patient data and maintaining the integrity of medical services.As healthcare becomes more data-driven,cyberattacks targeting these systems continue to rise,necessitating the development of robust,domain-adapted Intrusion Detection Systems(IDS).However,current IDS solutions often lack access to domain-specific datasets that reflect realistic threat scenarios in healthcare.To address this gap,this study introduces HCKDDCUP,a synthetic dataset modeled on the widely used KDDCUP benchmark,augmented with healthcare-relevant attributes such as patient data,treatments,and diagnoses to better simulate the unique conditions of clinical environments.This research applies standard machine learning algorithms Random Forest(RF),Decision Tree(DT),and K-Nearest Neighbors(KNN)to both the KDDCUP and HCKDDCUP datasets.The methodology includes data preprocessing,feature selection,dimensionality reduction,and comparative performance evaluation.Experimental results show that the RF model performed best,achieving 98%accuracy on KDDCUP and 99%on HCKDDCUP,highlighting its effectiveness in detecting cyber intrusions within a healthcare-specific context.This work contributes a valuable resource for future research and underscores the need for IDS development tailored to sector-specific requirements. 展开更多
关键词 cybersecurity KDDCUP HCKDDCUP machine learning anomaly detection data privacy
暂未订购
Research on Cybersecurity Threats and Defenses in the Context of Financial Technology
13
作者 Sishan Li Wei Li 《Journal of Electronic Research and Application》 2025年第3期20-24,共5页
With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it ... With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it also poses significant cybersecurity challenges to the financial sector. This study comprehensively analyzes the current state, challenges, and protective measures of cybersecurity in the financial sector, aiming to provide important references for financial institutions in formulating cybersecurity strategies and enhancing risk management. 展开更多
关键词 Financial sector cybersecurity Protective measures Data security
在线阅读 下载PDF
Research on the Collaborative Governance Path for the Digital Transformation of Community Cybersecurity Education in Foshan
14
作者 Zhuqing Chen Jinfeng Lu Tianjiao Wang 《Journal of Contemporary Educational Research》 2025年第9期454-459,共6页
The proliferation of smart communities in Foshan has led to increasingly diverse and prevalent cybersecurity risks for residents.This trend has rendered traditional cybersecurity education models inadequate in address... The proliferation of smart communities in Foshan has led to increasingly diverse and prevalent cybersecurity risks for residents.This trend has rendered traditional cybersecurity education models inadequate in addressing the challenges of the digital era.Guided by the theory of collaborative governance and the framework of digital transformation,this paper examines the multi-stakeholder collaborative mechanism involving the government,businesses,community organizations,universities,and residents.It subsequently proposes a series of implementation strategies such as digitizing educational content,intellectualizing platforms,contextualizing delivery methods,and refining management precision.Studies demonstrate that this model enables effective resource integration,improves educational precision,and boosts resident engagement.It represents a fundamental shift from unilateral dissemination to multi-party interaction and from decentralized management to collaborative synergy,offering a replicable“Foshan Model”for digital governance at the community level. 展开更多
关键词 Collaborative governance path Digital transformation Community cybersecurity education
在线阅读 下载PDF
AI-Driven Identification of Attack Precursors:A Machine Learning Approach to Predictive Cybersecurity
15
作者 Abdulwahid Al Abdulwahid 《Computers, Materials & Continua》 2025年第10期1751-1777,共27页
The increasing sophistication of cyberattacks,coupled with the limitations of rule-based detection systems,underscores the urgent need for proactive and intelligent cybersecurity solutions.Traditional intrusion detect... The increasing sophistication of cyberattacks,coupled with the limitations of rule-based detection systems,underscores the urgent need for proactive and intelligent cybersecurity solutions.Traditional intrusion detection systems often struggle with detecting early-stage threats,particularly in dynamic environments such as IoT,SDNs,and cloud infrastructures.These systems are hindered by high false positive rates,poor adaptability to evolving threats,and reliance on large labeled datasets.To address these challenges,this paper introduces CyberGuard-X,an AI-driven framework designed to identify attack precursors—subtle indicators of malicious intent—before full-scale intrusions occur.CyberGuard-X integrates anomaly detection,time-series analysis,and multi-stage classification within a scalable architecture.The model leverages deep learning techniques such as autoencoders,LSTM networks,and Transformer layers,supported by semi-supervised learning to enhance detection of zero-day and rare threats.Extensive experiments on benchmark datasets(CICIDS2017,CSE-CIC-IDS2018,and UNSW-NB15)demonstrate strong results,including 96.1%accuracy,94.7%precision,and 95.3%recall,while achieving a zero-day detection rate of 84.5%.With an inference time of 12.8 ms and 34.5%latency reduction,the model supports real-time deployment in resource-constrained environments.CyberGuard-X not only surpasses baseline models like LSTM and Random Forest but also enhances proactive threat mitigation across diverse network settings. 展开更多
关键词 Predictive cybersecurity attack precursors machine learning anomaly detection deep learning
在线阅读 下载PDF
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
16
作者 Federica Uccello Marek Pawlicki +2 位作者 Salvatore D'Antonio RafałKozik MichałChoras 《Computers, Materials & Continua》 2025年第5期1607-1621,共15页
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management systems.While machine learn... The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management systems.While machine learning–based intrusion detection systems can capture complex network behaviours,their“black-box”nature often limits trust and actionable insight for security operators.This study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules,thereby enhancing the detection of Distributed Denial of Service(DDoS)attacks.The proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules-to extract decision criteria from a fully trained model.The methodology was validated on two benchmark datasets,CICIDS2017 and WUSTL-IIOT-2021.Extracted rules were evaluated against conventional Security Information and Event Management Systems rules with metrics such as precision,recall,accuracy,balanced accuracy,and Matthews Correlation Coefficient.Experimental results demonstrate that xAI-derived rules consistently outperform traditional static rules.Notably,the most refined xAI-generated rule achieved near-perfect performance with significantly improved detection of DDoS traffic while maintaining high accuracy in classifying benign traffic across both datasets. 展开更多
关键词 cybersecurity explainable artificial intelligence intrusion detection system rule-based SIEM distributed denial of service
在线阅读 下载PDF
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity:A Survey 被引量:16
17
作者 Jun Zhang Lei Pan +3 位作者 Qing-Long Han Chao Chen Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第3期377-391,共15页
With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opport... With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opportunities brought by machine learning(ML),in particular deep learning(DL).In general,DL delivers superior performance to ML because of its layered setting and its effective algorithm for extract useful information from training data.DL models are adopted quickly to cyber attacks against CPS systems.In this survey,a holistic view of recently proposed DL solutions is provided to cyber attack detection in the CPS context.A six-step DL driven methodology is provided to summarize and analyze the surveyed literature for applying DL methods to detect cyber attacks against CPS systems.The methodology includes CPS scenario analysis,cyber attack identification,ML problem formulation,DL model customization,data acquisition for training,and performance evaluation.The reviewed works indicate great potential to detect cyber attacks against CPS through DL modules.Moreover,excellent performance is achieved partly because of several highquality datasets that are readily available for public use.Furthermore,challenges,opportunities,and research trends are pointed out for future research. 展开更多
关键词 Cyber-physical system cybersecurity deep learning intrusion detection pattern classification
在线阅读 下载PDF
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity 被引量:37
18
作者 Yan Jia Yulu Qi +2 位作者 Huaijun Shang Rong Jiang Aiping Li 《Engineering》 2018年第1期53-60,共8页
Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attack are always challenging tasks. Research on knowledge graphs is becoming increasingly mature in many fields. At prese... Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attack are always challenging tasks. Research on knowledge graphs is becoming increasingly mature in many fields. At present, it is very significant that certain scholars have combined the concept of the knowledge graph with cybersecurity in order to construct a cybersecurity knowledge base. This paper presents a cybersecurity knowledge base and deduction rules based on a quintuple model. Using machine learning, we extract entities and build ontology to obtain a cybersecurity knowledge base. New rules are then deduced by calculating formulas and using the path-ranking algorithm. The Stanford named entity rec- ognizer (NER) is also used to train an extractor to extract useful information. Experimental results show that the Stanford NER provides many features and the useGazettes parameter may be used to train a rec- ognizer in the cybersecurity domain in preparation for future work. 展开更多
关键词 cybersecurity KNOWLEDGE GRAPH KNOWLEDGE DEDUCTION
在线阅读 下载PDF
Using Event-Based Method to Estimate Cybersecurity Equilibrium 被引量:2
19
作者 Zhaofeng Liu Ren Zheng +1 位作者 Wenlian Lu Shouhuai Xu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第2期455-467,共13页
Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it ... Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it often observes states at a very high frequency.This inefficiency has motivated the idea of event-based method,which leverages the evolution dynamics in question and makes observations only when some rules are triggered(i.e.,only when certain conditions hold).This paper initiates the investigation of using the event-based method to estimate the equilibrium in the new application domain of cybersecurity,where equilibrium is an important metric that has no closed-form solutions.More specifically,the paper presents an event-based method for estimating cybersecurity equilibrium in the preventive and reactive cyber defense dynamics,which has been proven globally convergent.The presented study proves that the estimated equilibrium from our trigger rule i)indeed converges to the equilibrium of the dynamics and ii)is Zeno-free,which assures the usefulness of the event-based method.Numerical examples show that the event-based method can reduce 98%of the observation cost incurred by the periodic method.In order to use the event-based method in practice,this paper investigates how to bridge the gap between i)the continuous state in the dynamics model,which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state,and ii)the discrete state that is often encountered in practice,dubbed sample-state because it is sampled from some nodes.This bridge may be of independent value because probability-state models have been widely used to approximate exponentially-many discrete state systems. 展开更多
关键词 cybersecurity dynamics cybersecurity equilibrium event-based method global state estimation preventive and reactive cyber defense dynamics
在线阅读 下载PDF
Deep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks 被引量:2
20
作者 Mesfer Al Duhayyim Haya Mesfer Alshahrani +3 位作者 Fahd NAl-Wesabi Mohammed Alamgeer Anwer Mustafa Hilal Mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2022年第3期6257-6270,共14页
Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from attacks.In... Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from attacks.In this scenario,the rising popularity of Online Social Networks(OSN)is under threat from spammers for which effective spam bot detection approaches should be developed.Earlier studies have developed different approaches for the detection of spam bots in OSN.But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning(DL)models needs to be explored.With this motivation,the current research article proposes a Spam Bot Detection technique using Hybrid DL model abbreviated as SBDHDL.The proposed SBD-HDL technique focuses on the detection of spam bots that exist in OSNs.The technique has different stages of operations such as pre-processing,classification,and parameter optimization.Besides,SBD-HDL technique hybridizes Graph Convolutional Network(GCN)with Recurrent Neural Network(RNN)model for spam bot classification process.In order to enhance the detection performance of GCN-RNN model,hyperparameters are tuned using Lion Optimization Algorithm(LOA).Both hybridization of GCN-RNN and LOA-based hyperparameter tuning process make the current work,a first-of-its-kind in this domain.The experimental validation of the proposed SBD-HDL technique,conducted upon benchmark dataset,established the supremacy of the technique since it was validated under different measures. 展开更多
关键词 cybersecurity spam bot data classification social networks TWITTER deep learning
在线阅读 下载PDF
上一页 1 2 60 下一页 到第
使用帮助 返回顶部