To see the other types of publications on this topic, follow the link: Security threat.

Journal articles on the topic 'Security threat'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security threat.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Koper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.

Full text
Abstract:
The issue of interrelations between security and threat has a history as long as the history of mankind. Human beings since the beginning of times have always had needs of higher and lower importance, these needs sometimes collide with the needs and interests of others, thus creating a threat. Originally, the meaning of the term ‘security’ was limited only to the armed protection of territories against the enemies from neighboring countries. With time other layers of threat were recognized and determined. Nowadays, protection against external aggression is just one of many threats which must b
APA, Harvard, Vancouver, ISO, and other styles
2

Sliusarenko, Iryna. "Essentiality and Classification of International Security Threats at the Global Level (Based on Resolutions of the UN General Assembly First Committee, 2014–2021)." International Relations: Theory and Practical Aspects, no. 13 (June 26, 2024): 57–70. https://doi.org/10.31866/2616-745X.13.2024.306861.

Full text
Abstract:
The article analyses texts of resolutions of the UN GA First Committee and highlights threats mentioned in these documents for the period 2014–2021. The main objective of this research is to study the essentiality of security threats contained in the resolutions texts of the UN GA for the period 2014– 2021, as well as to classify the identified threats. M ethods of document analysis, content analysis and classification are applied in this study. On the whole, 800 documents are analysed. The content analysis of the English-language resolutions texts of the UN GA First Committee make
APA, Harvard, Vancouver, ISO, and other styles
3

A. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.

Full text
Abstract:
This article considers threats to integration systems, as well as methods of prevention. Threat modeling involves identifying potential threats to a system, assessing the likelihood and impact of each threat, and developing strategies to prevent or mitigate those threats. For integration systems, there are many potential information security threats, including unauthorized access, malware, insider threats, DoS attacks, SQL injection, and data leakage. To ensure the security and integrity of enterprise integration systems, it is crucial for organizations to understand these threats and implemen
APA, Harvard, Vancouver, ISO, and other styles
4

Saptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.

Full text
Abstract:
Boundary is an important part of the state's sovereignty and becomes a fortress of all kinds of threats. The threat about security of natural resources is one of non-military threat which affects Indonesia’s security. Betung Kerihun National Park adjoins to Malaysia in northern of Indonesia, so it can be vulnerable to threats. The purposes of this research are to analyze the threat of security toward management of Betung Kerihun National Park (TNBK), the efforts made to overcome the security threat, and the management of TNBK on the border of Indonesia and Malaysia. The research uses qualitati
APA, Harvard, Vancouver, ISO, and other styles
5

Gudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.

Full text
Abstract:
This study assesses the effectiveness of artificial intelligence (AI) technologies in enhancing threat detection within cloud environments, a critical component given the escalating security challenges in cloud computing. Leveraging various AI methodologies, including machine learning models, deep learning, and anomaly detection techniques, the research aims to improve the accuracy and efficiency of security systems. These AI methods were applied to a series of simulated threat scenarios across diverse cloud platforms to evaluate their capability in real-time threat identification and mitigati
APA, Harvard, Vancouver, ISO, and other styles
6

Datta, N. Bala Suresh. "Holistic Cyber Threat Intelligence System with Bert for Advanced Threat Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2662–64. https://doi.org/10.22214/ijraset.2025.68780.

Full text
Abstract:
Cyber threats are evolving at an unprecedented rate, making traditional security measures insufficient in detecting and mitigating sophisticated attacks. This project introduces an AI-powered Cyber Threat Intelligence System that leverages machine learning, natural language processing (NLP), and automated threat analysis to enhance cybersecurity defenses. The system integrates data from multiple threat intelligence sources, such as OSINT feeds, security reports, and real-time network traffic, to identify, classify, and prioritize security threats. By employing a BERT-based NLP engine, the syst
APA, Harvard, Vancouver, ISO, and other styles
7

Potla, Srikanth. "Threat Modeling in Application Security: A Practical Approach." European Journal of Computer Science and Information Technology 13, no. 30 (2025): 10–19. https://doi.org/10.37745/ejcsit.2013/vol13n301019.

Full text
Abstract:
Threat modeling has emerged as a critical component in modern application security, addressing the growing challenges of securing software systems in an increasingly complex digital landscape. This comprehensive discussion explores the fundamental principles of threat modeling and its integration into secure software development practices. The implementation of methodologies such as STRIDE and DREAD provides organizations with structured frameworks for identifying, assessing, and mitigating potential security vulnerabilities during early development stages. Through systematic evaluation of app
APA, Harvard, Vancouver, ISO, and other styles
8

Jenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.

Full text
Abstract:
A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functi
APA, Harvard, Vancouver, ISO, and other styles
9

Paskauskas, R. Andrew. "Decoding 5G security: toward a hybrid threat ontology." Open Research Europe 4 (March 6, 2025): 34. https://doi.org/10.12688/openreseurope.16916.2.

Full text
Abstract:
This Open Letter announces a new initiative, designed from the ground up, incorporating key cybersecurity standards while providing a novel framework for modelling hybrid threats in 5G infrastructure. The 5G Hybrid Threat Ontology is a structured framework designed to reduce risk and achieve sustainable resilience against hybrid threats targeting 5G infrastructure. As fifth-generation (5G) networks become integral to critical infrastructure, they introduce new vulnerabilities that adversaries can exploit through hybrid threats—multifaceted attacks spanning cyber, physical, and socio-political
APA, Harvard, Vancouver, ISO, and other styles
10

Albert, Craig, Amado Baez, and Joshua Rutland. "Human security as biosecurity." Politics and the Life Sciences 40, no. 1 (2021): 83–105. http://dx.doi.org/10.1017/pls.2021.1.

Full text
Abstract:
AbstractResearch within security studies has struggled to determine whether infectious disease (ID) represents an existential threat to national and international security. With the emergence of SARS-CoV-2 (COVID-19), it is imperative to reexamine the relationship between ID and global security. This article addresses the specific threat to security from COVID-19, asking, “Is COVID-19 a threat to national and international security?” To investigate this question, this article uses two theoretical approaches: human security and biosecurity. It argues that COVID-19 is a threat to global security
APA, Harvard, Vancouver, ISO, and other styles
11

Yarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.

Full text
Abstract:
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is proposed to use five indicators characterizing individual areas of information security and 37 world development indicators, selected from the World Bank database. Correlation analysis selected 12 out of 37 development indicators relevant to security indicators for which the correlation coefficient exceeded 0.5 o
APA, Harvard, Vancouver, ISO, and other styles
12

Pendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.

Full text
Abstract:
Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in tele
APA, Harvard, Vancouver, ISO, and other styles
13

Le, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Full text
Abstract:
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that mater
APA, Harvard, Vancouver, ISO, and other styles
14

Smirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.

Full text
Abstract:
The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Shuqin, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, and Shujun Li. "Multi-Source Knowledge Reasoning for Data-Driven IoT Security." Sensors 21, no. 22 (2021): 7579. http://dx.doi.org/10.3390/s21227579.

Full text
Abstract:
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation awareness and threat assessment difficult. In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links. In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO
APA, Harvard, Vancouver, ISO, and other styles
16

Farid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.

Full text
Abstract:
<p>In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security. Cyber actions in the virtual world are developing along with the rapid technology development. Moreover, the state policy on cyber issues is considered as a new threat to individual security. The development of that state security issue is being debated among the theoreticians of international security studies. The concept of securitization ex
APA, Harvard, Vancouver, ISO, and other styles
17

Hasan, Mohamad, and Tania Malik. "AI-Enhanced VPN Security Framework: Integrating Open-Source Threat Intelligence and Machine Learning to Secure Digital Networks." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 760–68. http://dx.doi.org/10.34190/eccws.23.1.2505.

Full text
Abstract:
In today's digital age, ensuring network privacy and integrity is of utmost importance. To address this, our work proposed an advanced VPN security framework that integrates open-source threat intelligence and machine learning (ML) to enhance cyber defences. By combining Wazuh for threat detection and analysis, and pfsense for firewall capabilities, with state-of-the-art ML algorithms, we present a robust VPN security solution to the challenges presented by the evolving landscape of cyber threats, representing a significant advancement in securing digital networks. This framework is strengthen
APA, Harvard, Vancouver, ISO, and other styles
18

Beladiya, Vandan, and Mihir Sontakke. "Cyber Security SOC Analyst." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2409–12. https://doi.org/10.22214/ijraset.2025.67835.

Full text
Abstract:
Abstract:In today's rapidly evolving digital landscape, organizations face an increasing number of cyber threats that jeopardize their sensitive data, operations, and reputation. A Cyber Security Security Operations Center (SOC) Analyst plays a critical role in detecting, analyzing, and mitigating cyber threats in real-time. This role involves continuous monitoring of security alerts, incident response, threat intelligence analysis, and ensuring compliance with security policies and frameworks. SOC Analysts leverage advanced security tools such as SIEM (Security Information and Event Managemen
APA, Harvard, Vancouver, ISO, and other styles
19

Sharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (2021): 1849. http://dx.doi.org/10.3390/electronics10151849.

Full text
Abstract:
Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to
APA, Harvard, Vancouver, ISO, and other styles
20

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.

Full text
Abstract:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO, and other styles
21

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.

Full text
Abstract:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO, and other styles
22

Wahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.

Full text
Abstract:
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs acco
APA, Harvard, Vancouver, ISO, and other styles
23

Mehdiyev, T. M., A. K. Shaykhanova, and G. B. Bekeshova. "ANALYSIS OF THREAT INTELLIGENCE SYSTEMS." Bulletin of Shakarim University. Technical Sciences 1, no. 4(16) (2024): 49–57. https://doi.org/10.53360/2788-7995-2024-4(16)-7.

Full text
Abstract:
Threat Intelligence (TI) is information about current or emerging threats to information security that is used to enhance the protection of organizations. TI systems collect and analyze data from various sources, including open sources, closed sources, as well as data obtained from partners and clients. Analysis of TI systems is the process of evaluating the effectiveness of these systems in data collection and analysis, as well as in providing useful information for decision-making in the field of information security. In the modern digital world, where information security threats are becomi
APA, Harvard, Vancouver, ISO, and other styles
24

Abhiram reddy bommareddy. "AI-Enhanced Microservice Security in Cloud-Based Financial Platforms: A Case Study of AWS Implementation." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1268–79. https://doi.org/10.32628/cseit241061171.

Full text
Abstract:
Securing cloud-based financial platforms presents unique challenges in an era of increasing cyber threats and distributed architectures. This article introduces a novel framework integrating artificial intelligence with microservices security, specifically designed for insurance and annuity sector applications. The proposed solution leverages predictive analytics and machine learning algorithms to enhance threat detection and response capabilities within containerized environments, implemented using Kubernetes on AWS infrastructure. The article demonstrates significant improvements in threat d
APA, Harvard, Vancouver, ISO, and other styles
25

Khin, Myat Nwe Win, and Myo Kay Khine Thaw Yin. "Information Sharing of Cyber Threat Intelligence with their Issue and Challenges." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 878–80. https://doi.org/10.5281/zenodo.3589821.

Full text
Abstract:
Today threat landscape growing at the rapid rate with much organization continuously face complex and malicious cyber threats. In today's Internet connected world where technologies support almost every feature of our society, cyber security and forensic specialists are increasingly distributing with wide ranging cyber threats in almost. real time conditions. The capability to detect, analyze, and defend against such threats in near real time conditions is not possible without the employment of threat intelligence, big data, and machine learning techniques. Cyber Threat Intelligence CTI ha
APA, Harvard, Vancouver, ISO, and other styles
26

Ismail, Assoujaa. "Designing Effective Threat Hunting to Enhance Security Programs." WSEAS TRANSACTIONS ON COMMUNICATIONS 23 (December 30, 2024): 142–48. https://doi.org/10.37394/23204.2024.23.19.

Full text
Abstract:
Cyber threat hunting is a proactive cybersecurity approach focused on identifying threats that evade traditional security measures. It involves the integration of human expertise, data analytics, and advanced tools to detect anomalies within organizational networks and systems. Despite its potential, many organizations remain dissatisfied with their threat hunting programs due to gaps in required analytical skills and the lack of integration of advanced techniques such as machine learning. This paper explores the design of an effective threat hunting exercise, examining its role in complementi
APA, Harvard, Vancouver, ISO, and other styles
27

Prayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.

Full text
Abstract:
The transition and development of forms of threats to the security of an international state at this time cannot always be resolved by armed forces and not only like war, this form of threat is known as non-traditional threat terms that threaten human security. The global Covid-19 pandemic not only poses a threat to aspects of national security but also has a major impact on human security. This study uses the Copenhagen perspective as the main theory in research and is supported by the concept of non-traditional security and the concept of securitization. This research method is a qualitative
APA, Harvard, Vancouver, ISO, and other styles
28

بوسنان, د. سفيان. "Illegal migration and the European Union " a perusal of securing the phenomenon"." مجلة العلوم السياسية, no. 55 (February 20, 2019): 205–28. http://dx.doi.org/10.30907/jj.v0i55.20.

Full text
Abstract:
Abstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new se
APA, Harvard, Vancouver, ISO, and other styles
29

Rutvij, Shah, Puthraya Karthik, and Paul Josson. "AI-Driven Threat Intelligence Systems: Predictive Cybersecurity Models for Adaptive IT Defense Mechanisms." Global Journal of Engineering and Technology [GJET] 4, no. 2 (2025): 13–15. https://doi.org/10.5281/zenodo.14964173.

Full text
Abstract:
<em>In the rapidly evolving digital landscape, cyber threats have become increasingly sophisticated, necessitating advanced threat intelligence systems. Artificial Intelligence (AI) has emerged as a pivotal technology in cybersecurity, enabling predictive models that enhance adaptive IT defense mechanisms. This paper explores AI-driven threat intelligence systems, detailing their architecture, methodologies, and applications in mitigating cyber threats. We discuss machine learning (ML) and deep learning (DL) models in predictive cybersecurity, real-time threat detection, and automated response
APA, Harvard, Vancouver, ISO, and other styles
30

Saidu, I. R., T. Suleiman, and U. E. Akpan. "THE CHALLENGES OF SECURITY THREAT IN NIGERIA CYBERSPACE." FUDMA JOURNAL OF SCIENCES 5, no. 1 (2021): 193–201. http://dx.doi.org/10.33003/fjs-2021-0501-554.

Full text
Abstract:
This research work was conducted to examine critically and systematically cyber threat intelligence challenges and prospects in Nigeria. It judges the value and relevance of cyber threat intelligence in the society where they are lacking in providing necessary information. Dealing with these challenges that may cause threat intelligence to be useless has become a major concern to Nigeria. The work was intended to achieve the following objectives: to examine the nature of cybersecurity in Nigeria, to analyse the cybersecurity threats that can disrupt the functioning of the country, to identify
APA, Harvard, Vancouver, ISO, and other styles
31

Sri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13325168.

Full text
Abstract:
The threat of different cyber threats as well as the development of new sophisticated malware necessitates the use of modern security measures to protect endpoint devices. One of the key promising approaches for enhancing the endpoint protection is Applying Explainable Artificial Intelligence (XAI) that provides a comprehensible explanation for identifying potential threats. This undergoing researching paper aims to identify and discuss how or whether XAI can help conduct security threats at endpoints and how it can identify and mitigate complex cyber threats while at the same time simplifying
APA, Harvard, Vancouver, ISO, and other styles
32

Coyles, David. "The security-threat-community." City 21, no. 6 (2017): 699–723. http://dx.doi.org/10.1080/13604813.2017.1412598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Prins, Gwyn, and Robert Salisbury. "Risk, Threat and Security." RUSI Journal 153, no. 1 (2008): 6–11. http://dx.doi.org/10.1080/03071840801984581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

FOURIE, PETER, and MARTIN SCHÖNTEICH. "AFRICA'S NEW SECURITY THREAT." African Security Review 10, no. 4 (2001): 29–42. http://dx.doi.org/10.1080/10246029.2001.9627950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

CUREA, Cătălina-Gabriela. "А HYBRID SECURITY THREAT". SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 24 (28 липня 2023): 67–72. http://dx.doi.org/10.19062/2247-3173.2023.24.9.

Full text
Abstract:
According with NATO Capstone Concept for the Military Contribution to Countering Hybrid Threats and EU Joint Framework to Counter Hybrid Threats, approved a new Military Strategy that will help set out NATO’s military priorities and approach to current and future challenges, including cyber and hybrid threats, instability across the Middle East and North Africa, and a more assertive Russia.[1]Hybrid conflict is defined as a dynamic interaction between elements of hard power (consolidation of military forces, deployment of military forces and capabilities in conflict zones, financing of separat
APA, Harvard, Vancouver, ISO, and other styles
36

Ilvonen, Ilona, and Pasi Virtanen. "Preparing for Cyber Threats with Information Security Policies." International Journal of Cyber Warfare and Terrorism 3, no. 4 (2013): 22–31. http://dx.doi.org/10.4018/ijcwt.2013100103.

Full text
Abstract:
Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The scenarios are built based on a literature review. One outcome of the analysis is that to an organisation it is irrelevant where a cyber threat originates from and who it is targeted for. If the threat is sp
APA, Harvard, Vancouver, ISO, and other styles
37

Dervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.

Full text
Abstract:
Abstract In the process of designing and forming each system, it is necessary to identify potential vulnerabilities and threats to that system and to include appropriate countermeasures. The process that helps to find the problem in the first phase of design is called threat modeling. Threat modeling is based on the idea that every system has valuable resources that need to be protected. These resources have certain weak points that internal or external threats can use to harm them, while there are as well countermeasures used to mitigate them. Therefore, this paper analyses the security of a
APA, Harvard, Vancouver, ISO, and other styles
38

Tanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.

Full text
Abstract:
Increasing technological complexity of cyber threats creates a major challenge between securing data privacy and maintaining potent cybersecurity practices. The paper examines privacy-protecting security methods in cybersecurity by detailing organizational approaches to defend private information throughout the cyber threat detection and mitigation process. Organizations need to establish the appropriate levels of data security because implementations that limit privacy too much threaten their security capabilities but weak protection measures create vulnerabilities to data breaches. The resea
APA, Harvard, Vancouver, ISO, and other styles
39

Semenenko, O., Y. Dobrovolsky, I. Tselishchev, V. Ivanov, Т. Akinina, and V. Dubovyi. "ON DETERMINATION OF THREATS TO THE NATIONAL SECURITY OF UKRAINE FROM THE UNDERWATER SPACE." Collection of scientific works of Odesa Military Academy 2, no. 14 (2021): 187–92. http://dx.doi.org/10.37129/2313-7509.2020.14.2.187-192.

Full text
Abstract:
The main factors determining the threats to Ukraine’s national security from the maritime direction in the part concerning the underwater space within the territorial sea of Ukraine are: increase of naval forces and their armament by other countries of the Black Sea region; presence of territorial claims; unresolved issues regarding the borders of economic maritime zones and the distribution of the continental shelf; economic interests of Ukraine and encroachment on its natural resources; conducting intelligence activities in national waters; terrorism at sea. Comprehensive consideration of th
APA, Harvard, Vancouver, ISO, and other styles
40

Meland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.

Full text
Abstract:
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, the authors address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis. The authors show that this effort is not trivial and a trade-off between visual expressiveness, usability and usefulness has to be considered. Specificall
APA, Harvard, Vancouver, ISO, and other styles
41

Dr. S. Gopinath, Mr. M. Hemanand, Mr. P. Arunprasath, Mr. M. Vivek, Mr. P. Balaji, and S.S. Leena Charan. "Maritime Cyber security." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 02 (2025): 167–72. https://doi.org/10.47392/irjaem.2025.0029.

Full text
Abstract:
As the maritime industry continues to digitalize in pursuit of efficiency and connectivity, it increasingly opens itself up to growing cyber threats, which may very seriously hamper operations, cause huge financial losses, or even result in environmental disasters. Specifically, this paper investigates the important aspects of maritime cybersecurity about protecting infrastructure from cyber threats. The paper points to the weaknesses brought about by the integration of IT and OT systems in the maritime sector, illustrated with high-profile incidents like the NotPetya attack on Maersk and the
APA, Harvard, Vancouver, ISO, and other styles
42

Grachev, Aleksandr, and Aleksandr Litvinenko. "Economic losses in the system of ensuring the economic security of an economic entity and the State." Economy under Guard 1, no. 1 (2024): 51–59. http://dx.doi.org/10.36511/2078-5356-2024-1-51-59.

Full text
Abstract:
The article presents an analysis of the losses of the economic system under the influence of threats to economic security. It is concluded that the absence of economic losses cannot be considered as a characteristic of the security of the state of the economic system. It is proposed to divide the economic losses caused by threats and dangers, it is necessary to divide them into: those related to countering the threat to economic security; those related to damage from exposure to the threat. The economic losses associated with countering the threat to economic security are divided into: losses
APA, Harvard, Vancouver, ISO, and other styles
43

Albarrak, Khalied M. "Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security." Applied Sciences 14, no. 23 (2024): 10867. http://dx.doi.org/10.3390/app142310867.

Full text
Abstract:
The Web of Things (WoT) represents a significant advancement on the Internet of Things (IoT), where web technologies are integrated to enhance device interoperability and accessibility. While this integration offers numerous benefits, it also introduces new and complex security challenges. This paper presents a critical analysis of WoT security, examining the ecosystem’s vulnerabilities and associated threats. Our contributions include an in-depth analysis of existing threat enumeration methodologies, highlighting misconceptions and inefficiencies that may weaken security measures. We further
APA, Harvard, Vancouver, ISO, and other styles
44

Guchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.

Full text
Abstract:
The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber security worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cyberspace has already become a weapon of infinite capacity for the whole world. It has generated positive effect as well as has become the area of evil for terrorists, which are actively using mode
APA, Harvard, Vancouver, ISO, and other styles
45

Sliusarenko, Iryna. "Classification of the Security Threats at the Regional and Subregional Levels (Based on First Committee Resolutions of the United Nations General Assembly)." International Relations: Theory and Practical Aspects, no. 6 (December 9, 2020): 126–39. https://doi.org/10.31866/2616-745x.6.2020.218779.

Full text
Abstract:
Analysis of the resolutions texts of the First Committee of the United Nations General Assembly (UN GA) allows us to identify exactly those threats on which there is a consensus of the majority of the UN GA member states. The purpose of the study is to identify security threats at the regional and subregional levels and to classify them based on the analysis of the resolutions texts of the UN GA First Committee (on disarmament and international security) for 2014&ndash;2019. The method of content analysis of Russian-language resolutions texts of the UN General Assembly&rsquo;s First Committee
APA, Harvard, Vancouver, ISO, and other styles
46

Kaur, Rajwinder, Jasminder Kaur Sandhu, Meena Pundir, Gurjinder Singh, and Aina Mehta. "Towards a Systematic Threat Modeling Approach for Wireless Sensor Networks." ECS Transactions 107, no. 1 (2022): 8855–62. http://dx.doi.org/10.1149/10701.8855ecst.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have attracted the research fraternity due to the prevalent use of this technology in various domains such as health, automation, and the military. The WSN consists of numerous sensor nodes deployed randomly. As these networks are deployed in a real-world scenario, security and privacy are of utmost concern. Security protects the wireless network against an adversary. Firstly design the security, identification of security threats, the security design for suggestive countermeasures is designed. Threat and attack modeling are well-known techniques for designing a
APA, Harvard, Vancouver, ISO, and other styles
47

Dr., Arjun Singh Chauhan. "MODERN CYBER REGULATIONS AND TECH CRIMES IN THE 21ST CENTURY." Indian Journal of Law and Society I, no. 8 (2024): 39–53. https://doi.org/10.5281/zenodo.10644551.

Full text
Abstract:
<strong>ABSTRACT</strong> <em>In an era dominated by digital inter connectedness, the significance of robust cyber security measures cannot be overstated. This abstract provides an overview of a comprehensive study aimed at advancing cyber security practices through the integration of cutting-edge technologies and proactive threat intelligence strategies. The research delves into the current landscape of cyber security, highlighting the escalating sophistication of cyber threats and the evolving tactics employed by malicious actors. Recognizing the imperative need for adaptive defense mechanis
APA, Harvard, Vancouver, ISO, and other styles
48

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Full text
Abstract:
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive ma
APA, Harvard, Vancouver, ISO, and other styles
49

Sheik, Al Tariq, Carsten Maple, Gregory Epiphaniou, and Mehrdad Dianati. "A Comprehensive Survey of Threats in Platooning—A Cloud-Assisted Connected and Autonomous Vehicle Application." Information 15, no. 1 (2023): 14. http://dx.doi.org/10.3390/info15010014.

Full text
Abstract:
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Although several studies have been published around the threat and risk estimation aspects of CCAV, limited research exists on the security implications and emerging threat landscapes in the CCAV platooning application. We conducted an extensive review and categorisation of real-world security incidents and created an account of 132 threats from scholarly
APA, Harvard, Vancouver, ISO, and other styles
50

Arat, Ferhat, and Sedat Akleylek. "Modified graph-based algorithm to analyze security threats in IoT." PeerJ Computer Science 9 (December 8, 2023): e1743. http://dx.doi.org/10.7717/peerj-cs.1743.

Full text
Abstract:
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability probl
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!