Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Cyber Situational Awareness (CSA).

Статті в журналах з теми "Cyber Situational Awareness (CSA)"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cyber Situational Awareness (CSA)".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Han, Weihong, Hafiz Muhammad Jamsheed Nazir, and Shudong Li. "Security Evaluation of Situational Awareness in Cyberspace Based on Artificial Neural Network-Back Propagation." Wireless Communications and Mobile Computing 2022 (October 13, 2022): 1–9. http://dx.doi.org/10.1155/2022/1777560.

Повний текст джерела
Анотація:
Computer network security has become increasingly controversial among many businesses as a result of the rise in cyber threats. Artificial neural network (ANN) is mature research in this field, whereas the traditional algorithm is slower, in feedback error, and has the disadvantage of easy convergence to local extreme value. To guide against these threats, in this paper, ANN-back propagation (BP) algorithm is used to establish the relationship between the level of cyber security situational awareness (CSA) and the perceptual parameters and quantitatively evaluate the situational awareness. Thi
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Tan, Chee Keong, Sofiah Kadar Khan, and Umar Farooq Khattak. "Exploration of The Impact of Cyber Situational Awareness On Small and Medium Enterprises (SMEs) in Malaysia." Journal of Informatics and Web Engineering 4, no. 1 (2025): 292–306. https://doi.org/10.33093/jiwe.2025.4.1.21.

Повний текст джерела
Анотація:
The objective of this study is to explore the cyber situational awareness (CSA) level among the employees of small and medium-sized enterprises (SME) in Malaysia, by extending Endsley's situation awareness (SA) theory. It is crucial to understand the level of cyber situational awareness among employees as it sheds light on how well the employees understand the cyber threats and if they can handle them effectively. Literature has reviewed that SMEs are subject to a greater danger of cyber-attacks. Therefore, employees' awareness of cyber situations is of the utmost significance in studying cybe
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Nazir, Hafiz Muhammad Jamsheed, and Weihong Han. "Proliferation of Cyber Situational Awareness: Today’s Truly Pervasive Drive of Cybersecurity." Security and Communication Networks 2022 (January 25, 2022): 1–16. http://dx.doi.org/10.1155/2022/6015253.

Повний текст джерела
Анотація:
Situation awareness (SA) issues necessitate a comprehension of present activities, the ability to forecast, what will happen next, and strategies to assess the threat or impact of current internet activities and projections. These SA procedures are universal, domain-independent and can be used to detect cyber intrusions. This study introduces cyber situation awareness (CSA), its origin, conception, aim, and characteristics based on an analysis of function shortages and development requirements. Furthermore, we discussed the CSA research framework and examined the research history, which is the
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Llopis Sanchez, Salvador, David Sandoval Rodriguez-Bermejo, Roumen Daton Medenou, Ramis Pasqual de Riquelme, Francesco Torelli, and Jorge Maestre Vidal. "Tackling Verification and Validation Techniques to Evaluate Cyber Situational Awareness Capabilities." Mathematics 10, no. 15 (2022): 2617. http://dx.doi.org/10.3390/math10152617.

Повний текст джерела
Анотація:
Since cyberspace was identified as a domain of operations, defence practitioners started a race with academy, researchers, and industry and military organizations working together towards defining related lines of capability development (e.g., DOTMLPFI) and exploring the needs and opportunities they entail. An essential cornerstone of adapting to the convergence of the cyber domain with conventional theaters of operation is the need for producing tools for easing to acquire cyber situational awareness (CSA), from which human operators shall be able to perceive, reason and project situations an
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Johnson, Elizabeth A., and Jane M. Carrington. "Cyber-Situational Awarenss in Clinical Trials Using Wearable Device Technology." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (2021): 33–36. http://dx.doi.org/10.1177/2327857921101011.

Повний текст джерела
Анотація:
It is estimated 1 in 3 clinical trials utilize a wearable device to gather real-time participant data, including sleep habits, telemetry, and physical activity. While wearable technologies (including smart watches, USBs, and implantable devices) have been revolutionary in their ability to provide a higher precision and accuracy to data acquisition external to the research milieu, there is hesitancy among providers and participants alike given security concerns, perception of cyber-related threats, and meaning attributed to privacy issues. The purpose of this research is to define cyber-situati
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Almanza-Ortega, Nelva Nely, Joaquin Perez-Ortega, Monterrubio Sergio Mauricio Martínez, and Juan A. Recio-Garcia. "An Explainable Clustering-Based Approach for Cyber Situational Awareness on Masquerade Attacks Detection." Journal of Artificial Intelligence and Computing Applications 2, no. 2 (2024): 48–59. https://doi.org/10.5281/zenodo.15098302.

Повний текст джерела
Анотація:
Masquerade attacks pose a significant challenge in cybersecurity, as intruders mimic legitimate user behavior to evade detection. In dynamic, data-intensive environments, traditional intrusion detection systems often struggle to provide both timely and interpretable results, limiting their usefulness for effective Cyber Situational Awareness (CSA). This article presents a clustering-based approach for detecting masquerade attacks using OK-Means—a variant of K-Means optimized for faster convergence—combined with a nearest neighbor classifier and noise reduction techniques. The propo
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Almanza-Ortega, Nelva Nely, Joaquin Perez-Ortega, Monterrubio Sergio Mauricio Martínez, and Juan A. Recio-Garcia. "Clustering-Based Cyber Situational Awareness: A Practical Approach for Masquerade Attack Detection." Journal of Artificial Intelligence and Computing Applications 2, no. 1 (2024): 35–39. https://doi.org/10.5281/zenodo.14933955.

Повний текст джерела
Анотація:
Cyber Situational Awareness (CSA) is crucial for detecting and mitigating security threats in evolving digital environments. Traditional intrusion detection systems face challenges related to computational efficiency, scalability, and interpretability, particularly in the detection of masquerade attacks, where attackers mimic legitimate user behavior. This exploratory study conducts a preliminary investigation into a clustering-based approach that integrates OK-Means, an optimized variant of K-Means, with k-Nearest Neighbors (k-NN) to improve intrusion detection. The proposed approach is evalu
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Aragonés Lozano, Mario, Israel Pérez Llopis, and Manuel Esteve Domingo. "Threat Hunting Architecture Using a Machine Learning Approach for Critical Infrastructures Protection." Big Data and Cognitive Computing 7, no. 2 (2023): 65. http://dx.doi.org/10.3390/bdcc7020065.

Повний текст джерела
Анотація:
The number and the diversity in nature of daily cyber-attacks have increased in the last few years, and trends show that both will grow exponentially in the near future. Critical Infrastructures (CI) operators are not excluded from these issues; therefore, CIs’ Security Departments must have their own group of IT specialists to prevent and respond to cyber-attacks. To introduce more challenges in the existing cyber security landscape, many attacks are unknown until they spawn, even a long time after their initial actions, posing increasing difficulties on their detection and remediation. To be
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jabar, Thulfiqar, and Manmeet Mahinderjit Singh. "Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework." Sensors 22, no. 13 (2022): 4662. http://dx.doi.org/10.3390/s22134662.

Повний текст джерела
Анотація:
During the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place that impact the confidentiality, integrity, and availability (CIA) of the information. One attack that occurs is Advanced Persistent Threat (APT). Attackers can manipulate a device’s behavior, applications, and services. Such manipulations lead to signification of a deviation from a known behavioral baseline for smartphones. In this study, the autho
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Leopold, Helmut. "Cyber Situational Awareness." e & i Elektrotechnik und Informationstechnik 132, no. 2 (2015): 97–100. http://dx.doi.org/10.1007/s00502-015-0291-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

L. Gorham, Christopher. "Developing Enterprise Cyber Situational Awareness." International Journal of Managing Information Technology 12, no. 3 (2020): 1–8. http://dx.doi.org/10.5121/ijmit.2020.12301.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Christopher, L. Gorham. "Developing Enterprise Cyber Situational Awareness." International Journal of Managing Information Technology (IJMIT) 12, no. 3 (2020): 1 to 8. https://doi.org/10.5281/zenodo.4023854.

Повний текст джерела
Анотація:
This paper will examine why its become important for organizations to develop an comprehensive Information Technology (IT) Modernization strategy that focuses on improving their business process and protecting their network infrastructure by leveraging modern-day cybersecurity tools. Most of the topic will focus on the U.S. Department of Defense’s (DOD) strategy towards improving their network security defenses for the department and the steps they’ve taken at the agency level where components under DOD such as DISA (The Defense Information Systems Agency) are working towards addin
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Simaan, Nabil, Rusell H. Taylor, and Howie Choset. "Intelligent Surgical Robots with Situational Awareness." Mechanical Engineering 137, no. 09 (2015): S3—S6. http://dx.doi.org/10.1115/1.2015-sep-6.

Повний текст джерела
Анотація:
This article discusses various challenges and puts forth the concepts of intelligent surgical robots and complementary situational awareness (CSA) as a means for achieving new surgical systems with unprecedented capabilities in terms of safety, ease of operation, and exact execution of pre-operative surgical plans. Situational awareness is defined in accordance with by the three stages of sensory acquisition, sensory comprehension, and projection. A robotic system with CSA assists the user not only in manipulation, but also in forming the situational awareness regarding the task at hand by usi
Стилі APA, Harvard, Vancouver, ISO та ін.
14

N, Udhaya abisheik, Thirumalai Samy M, Thamizhlvanan G, and Sujith M. "Parents Situational Awareness Of Cybersecurity." International Journal of Advance and Applied Research 10, no. 2 (2022): 82–86. https://doi.org/10.5281/zenodo.7430894.

Повний текст джерела
Анотація:
<strong>Abstract &ndash;</strong> Using survey results from 872 parents of students in the 17 and under age range, this study aims to assess the level of parental knowledge of cyber security in order to protect their children. Using statistical software called SPSS, a quantitative data analysis was carried out and the results were interpreted based on the distribution of locations. Descriptive data and generic respondent profile were combined as part of the analytical process. Any research findings would advise a greater focus on the Cyber Parenting Model to identify the elements that influenc
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Ahmad, Hussain, Faheem Ullah, and Rehan Jafri. "A Survey on Immersive Cyber Situational Awareness Systems." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 33. https://doi.org/10.3390/jcp5020033.

Повний текст джерела
Анотація:
Cyber situational awareness systems are increasingly used for creating cyber common operating pictures for cybersecurity analysis and education. However, these systems face data occlusion and convolution issues due to the burgeoning complexity, dimensionality, and heterogeneity of cybersecurity data, which damages cyber situational awareness of end-users. Moreover, conventional forms of human–computer interactions, such as mouse and keyboard, increase the mental effort and cognitive load of cybersecurity practitioners when analyzing cyber situations of large-scale infrastructures. Therefore, i
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Klein, Gabriel, Simon Hunke, Heiko Günther, and Marko Jahnke. "Model-based Cyber Defense Situational Awareness." PIK - Praxis der Informationsverarbeitung und Kommunikation 35, no. 1 (2012): 46–53. http://dx.doi.org/10.1515/pik-2012-0008piko.2012.35.1.46.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Li, Zheng. "Overview of cyber security situation awareness." Applied and Computational Engineering 30, no. 1 (2024): 149–54. http://dx.doi.org/10.54254/2755-2721/30/20230089.

Повний текст джерела
Анотація:
The rapid development of the network has made the network immersed in most people's lives, and even the degree of development of the network reflects the overall national strength of a country. Moreover, the control of the country is unable to leave the power of the network. All countries are becoming more and more urgent for the development of network, but in the face of more and more diverse attacks, people become overwhelmed. Network security is crucial to individuals, organizations and countries, and is related to the stability of the whole society and the security of the country. Therefor
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Kozakiewicz, Adam. "Świadomość sytuacyjna cyberzagrożeń (Cyber-threat situational awareness)." Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 8-9/2018 (September 12, 2018): 562–68. https://doi.org/10.15199/59.2018.8-9.3.

Повний текст джерела
Анотація:
The paper discusses the crucial role played by adequate situational awareness in the protection of modern networks and computer systems. It demonstrates the issue of building a large-scale system for collection and analysis of threat data, aiming to increase the situational awareness of European companies, organizations and institutions.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Robinson, David, and George Cybenko. "A Cyber-based Behavioral Model." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 9, no. 3 (2012): 195–203. http://dx.doi.org/10.1177/1548512911425808.

Повний текст джерела
Анотація:
While long considered an important aspect of strategic and theater planning, situational awareness (SA) is the linchpin to both cyber planning and execution. As stated in Joint doctrine, before military activities in the information environment can be accurately and effectively planned, the “state” of the environment must be understood. At its core, cyber situational awareness requires understanding the environment in terms of how information, events, and actions will impact goals and objectives, both now and in the near future. Joint Information Operations (IO) doctrine defines three layers o
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Gaskova, D. A., and A. G. Massel. "The Method of Cyber Awareness Analysis of an Energy Facility." Vestnik NSU. Series: Information Technologies 19, no. 2 (2021): 17–28. http://dx.doi.org/10.25205/1818-7900-2021-19-2-17-28.

Повний текст джерела
Анотація:
The article proposes to analyze cyber-situational awareness of an energy facility in three stages. There are i) analysis of cyber threats to the energy infrastructure; ii) modeling of extreme situations scenarios in the energy sector caused by the implementation of the cyber threats; iii) risk assessment of the cybersecurity disruption to energy infrastructure. Three methods are presented, corresponding to each stage. The authors propose to apply semantic modeling methods to analyze the impact of cyber threats to energy facilities, taking into account energy security within the presented appro
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Aggarwal, Palvi, Frederic Moisan, Cleotilde Gonzalez, and Varun Dutt. "Understanding Cyber Situational Awareness in a Cyber Security Game involving." International Journal on Cyber Situational Awareness 4, no. 1 (2018): 11–38. http://dx.doi.org/10.22619/ijcsa.2018.100118.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Dobson, Geoffrey B., Timothy J. Shimeall, and Kathleen M. Carley. "Towards Network Science Enhanced Cyber Situational Awareness." International Journal on Cyber Situational Awareness 2, no. 1 (2017): 11–30. http://dx.doi.org/10.22619/ijcsa.2017.100112.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Husák, Martin, Tomáš Bajtoš, Jaroslav Kašpar, Elias Bou-Harb, and Pavel Čeleda. "Predictive Cyber Situational Awareness and Personalized Blacklisting." ACM Transactions on Management Information Systems 11, no. 4 (2020): 1–16. http://dx.doi.org/10.1145/3386250.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Sutton, David. "Trusted information sharing for cyber situational awareness." e & i Elektrotechnik und Informationstechnik 132, no. 2 (2015): 113–16. http://dx.doi.org/10.1007/s00502-015-0288-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Tarrillo, Dr Segundo Juan Sanchez, Dr Rosa Guadalupe Neciosup Rosas, Dr Evert José Fernández Vásquez, et al. "The Impact of Internet Security Awareness among Undergraduates in Learning Management System." Journal of Internet Services and Information Security 14, no. 3 (2024): 256–64. http://dx.doi.org/10.58346/jisis.2024.i3.015.

Повний текст джерела
Анотація:
The issue of Cybersecurity (CS) danger is a persistent and escalating burden that has garnered worldwide attention in recent years. This might be attributed to technological advances that have transformed the internet into a breeding ground for cybercriminals. The rising frequency of cybercrimes emphasizes the need for heightened CS Awareness (CSA) and education among individuals and institutions. This study investigates the level of CSA among undergraduates (UG). Surveys were sent to 250 UG from four chosen postsecondary institutions in Peru. The samples were selected using a basic random sam
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Marnewick, Annlizé, and Suné Von Solms. "The Development of Cybersecurity Awareness Measurement Model in the Water Sector." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 211–18. http://dx.doi.org/10.34190/iccws.17.1.43.

Повний текст джерела
Анотація:
:Cyber-attacks are one of the main threats to information systems, and humans have been identified as the weakest link with regards to information security. This study aims to develop a measurement instrument to evaluate the level of cyber security awareness (CSA) in the water sector in South Africa. There are lots of synergies with regards to cyber system usage across industries, and as a result this study will take a broad base approach in configuring an instrument that can be used to adequately assess the sample space in question. Having a reliable instrument to measure cyber security aware
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Simola, Jussi, and Jouni Pöyhönen. "Emerging Cyber risk Challenges in Maritime Transportation." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 306–14. http://dx.doi.org/10.34190/iccws.17.1.46.

Повний текст джерела
Анотація:
Maritime security and surveillance have become one of the main areas in managing overall situational awareness.For example, the growing importance of maritime traffic in cross-border trade has created new pressures to develop newtechnologies for accident prevention, especially in the ports. Maritime safety is also a matter of concern for continuitymanagement. Automatic ship alarm systems, coastal radars and coastal cameras are not alone sufficient equipment to buildmaritime awareness. The Universal Shipborne Automatic Identification System (AIS) is a ship transponder system that is aglobally u
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Kim, Kookjin, Jaepil Youn, Sukjoon Yoon, Jiwon Kang, Kyungshin Kim, and Dongkyoo Shin. "Study on Cyber Common Operational Picture Framework for Cyber Situational Awareness." Applied Sciences 13, no. 4 (2023): 2331. http://dx.doi.org/10.3390/app13042331.

Повний текст джерела
Анотація:
The remarkable development of the Internet has made our lives very convenient, such as through the ability to instantaneously transmit individual pictures. As a result, cyber-attacks are also being developed and increasing, and the computer/mobile devices we use can become infected with viruses in an instant. Rapid cyber situational awareness is essential to prepare for such cyber-attacks. Accelerating cyber situational awareness requires Cyber Common Operational Pictures, which integrate and contextualize numerous data streams and data points. Therefore, we propose a Cyber Common Operational
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Alcântara da Silva, André Lucas, and Gills Vilar-Lopes. "Consciência situacional como ferramenta estratégica da defesa cibernética." Relações Internacionais, no. 82 (June 2024): 109–22. http://dx.doi.org/10.23906/ri2024.82a08.

Повний текст джерела
Анотація:
The technological growth of the last decades has changed the way many sectors of society and the state carry out their respective activities. The defense sector is part of this framework due to its essentially technological nature. With these changes, discussions began about phenomena known as ‘cyberspace’, ‘cyber power’, and ‘cyber domain’. Because cyberspace permeates and can even influence the other operational domains (sea, land, air, and space), having the right knowledge of cyberspace – both one’s own and that of one’s adversaries – has become a competitive advantage in interstate confli
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Pöyhönen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajamäki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organization." Information & Security: An International Journal 43, no. 2 (2019): 236–56. https://doi.org/10.11610/isij.4318.

Повний текст джерела
Анотація:
Cybersecurity-related capabilities play an ever-growing role in national security, as well as securing the functions vital to society. The national cyber capability includes the resilience of companies running critical infrastructures, their cyber situational awareness (SA) and the sharing of cybersecurity information required for cyber SA. As critical infrastructures become more complex and interdepend-ent, ramifications of incidents multiply. The EU Network and Information Security Directive calls for cybersecurity collaboration between EU member states regarding critical infrastructures and
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Toxirjonovich, Orinov Nodirbek, and Xolmirzayeva Gulchexra Tulanovna. "Situational awareness gaps and opportunities for cyber security." ACADEMICIA: An International Multidisciplinary Research Journal 12, no. 1 (2022): 512–18. http://dx.doi.org/10.5958/2249-7137.2022.00082.9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Shalamanov, Velizar, Nikolai Stoianov, and Yantsislav Yanakiev. "ICT Governance, Human Factors and Cyber Situational Awareness." Information & Security: An International Journal 46, no. 1 (2020): 7–10. http://dx.doi.org/10.11610/isij.4600.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Rongrong, Xi, Yun Xiaochun, and Hao Zhiyu. "Framework for risk assessment in cyber situational awareness." IET Information Security 13, no. 2 (2019): 149–56. http://dx.doi.org/10.1049/iet-ifs.2018.5189.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Mahoney, Samuel, Emilie Roth, Kristin Steinke, Jonathan Pfautz, Curt Wu, and Mike Farry. "A Cognitive Task Analysis for Cyber Situational Awareness." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 54, no. 4 (2010): 279–83. http://dx.doi.org/10.1177/154193121005400403.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

李, 际磊. "Research on Application of Threat Intelligence in Situational Awareness." Computer Science and Application 09, no. 10 (2019): 1939–45. http://dx.doi.org/10.12677/csa.2019.910217.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Edim Bassey Edim, Akpan Itoro Udofot, and Omotosho Moses Oluseyi. "AI-augmented cyber security threat intelligence – enhancing situational awareness." International Journal of Science and Research Archive 14, no. 1 (2025): 890–97. https://doi.org/10.30574/ijsra.2025.14.1.2650.

Повний текст джерела
Анотація:
In the evolving landscape of cyber threats, traditional threat intelligence methods are increasingly inadequate for addressing the complexity and speed of modern attacks. This paper explores the transformative impact of Artificial Intelligence (AI) on enhancing cyber security threat intelligence and situational awareness. By leveraging advanced AI technologies—such as machine learning, natural language processing, and data analytics—organizations can significantly improve their ability to detect, analyze, and respond to threats. We provide a comprehensive review of current AI applications in t
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Slonopas, Andre, Gerald A. Mazur, Jessica A. Coughlin, Mary McElman, Jacob F. Strahan, and Shawn G. Talmadge. "A Unified Cyber Response for Water Utilities: The Cyber Fortress Exercise." Journal AWWA 117, no. 2 (2025): 6–14. https://doi.org/10.1002/awwa.2399.

Повний текст джерела
Анотація:
Key TakeawaysStates should synchronize their cyber incident responses and consequence management plans to execute shared objectives, improve situational awareness, and quickly restore services.The Cyber Fortress exercise underscores the need for federal, state, private, and academic sectors to collaborate and strengthen cyber resilience for critical infrastructure, particularly for water utilities.Through training and simulations, cyber operators and public–private cyber defenders learn to detect and mitigate sophisticated threats.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

D'Amico, Anita, Kirsten Whitley, Daniel Tesone, Brianne O'Brien, and Emilie Roth. "Achieving Cyber Defense Situational Awareness: A Cognitive Task Analysis of Information Assurance Analysts." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 3 (2005): 229–33. http://dx.doi.org/10.1177/154193120504900304.

Повний текст джерела
Анотація:
A Cognitive Task Analysis (CTA) was performed to investigate the workflow, decision processes, and cognitive demands of information assurance (IA) analysts responsible for defending against attacks on critical computer networks. We interviewed and observed 41 IA analysts responsible for various aspects of cyber defense in seven organizations within the US Department of Defense (DOD) and industry. Results are presented as workflows of the analytical process and as attribute tables including analyst goals, decisions, required knowledge, and obstacles to successful performance. We discuss how IA
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Franke, Ulrik, and Joel Brynielsson. "Cyber situational awareness – A systematic review of the literature." Computers & Security 46 (October 2014): 18–31. http://dx.doi.org/10.1016/j.cose.2014.06.008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Rajamäki, Jyri. "Trust Environment for Cyber-Physical Systems: The DYNAMO Approach." International Journal on Applied Physics and Engineering 3 (January 8, 2024): 1–10. http://dx.doi.org/10.37394/232030.2024.3.1.

Повний текст джерела
Анотація:
This paper explores the evolving landscape of cybersecurity within cyber-physical systems, emphasizing the critical need for resilience and trust-building mechanisms. Grounded in the foundational perspectives of Cybersecurity Science, the study addresses the challenges posed by the complex interdependencies among physical, information, cognitive, and social domains. It introduces the DYNAMO platform, a novel approach that integrates Cyber Threat Intelligence (CTI) with Business Continuity Management (BCM) to enhance situational awareness and recovery planning. The platform's comprehensive meth
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Samtani, Sagar, Weifeng Li, Victor Benjamin, and Hsinchun Chen. "Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal." Digital Threats: Research and Practice 2, no. 4 (2021): 1–10. http://dx.doi.org/10.1145/3450972.

Повний текст джерела
Анотація:
To increase situational awareness, major cybersecurity platforms offer Cyber Threat Intelligence (CTI) about emerging cyber threats, key threat actors, and their modus operandi. However, this intelligence is often reactive, as it analyzes event log files after attacks have already occurred, lacking more active scrutiny of potential threats brewing in cyberspace before an attack has occurred. One intelligence source receiving significant attention is the Dark Web, where significant quantities of malicious hacking tools and other cyber assets are hosted. We present the AZSecure Hacker Assets Por
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Androjna, Andrej, and Marko Perkovič. "Impact of Spoofing of Navigation Systems on Maritime Situational Awareness." Transactions on Maritime Science 10, no. 2 (2021): 361–73. http://dx.doi.org/10.7225/toms.v10.n02.w08.

Повний текст джерела
Анотація:
The development of contemporary navigation and positioning systems have significantly improved reliability and speeds in maritime navigation. At the same time, the vulnerabilities of these systems to cyber threats represent a remarkable issue to the safety of navigation. Therefore, the maritime community has raised the question of cybersecurity of navigation systems in recent years. This paper aims to analyse the vulnerabilities of the Global Navigation Satellite System (GNSS), Electronic Chart Display Information System (ECDIS) and Automatic Identification System (AIS). The concepts of these
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Pahi, Timea, and Florian Skopik. "A Public-Private-Partnership Model for National Cyber Situational Awareness." International Journal on Cyber Situational Awareness 1, no. 1 (2016): 31–53. http://dx.doi.org/10.22619/ijcsa.2016.100102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Pöyhönen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajamäki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." Information & Security: An International Journal 43, no. 2 (2019): 236–56. http://dx.doi.org/10.11610/isij.4318.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Angelini, Marco, and Giuseppe Santucci. "Cyber situational awareness: from geographical alerts to high-level management." Journal of Visualization 20, no. 3 (2016): 453–59. http://dx.doi.org/10.1007/s12650-016-0377-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Medenou Choumanof, Roumen Daton, Salvador Llopis Sanchez, Victor Manuel Calzado Mayo, et al. "Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness." Sensors 22, no. 14 (2022): 5104. http://dx.doi.org/10.3390/s22145104.

Повний текст джерела
Анотація:
The digital transformation of the defence sector is not exempt from innovative requirements and challenges, with the lack of availability of reliable, unbiased and consistent data for training automatisms (machine learning algorithms, decision-making, what-if recreation of operational conditions, support the human understanding of the hybrid operational picture, personnel training/education, etc.) being one of the most relevant gaps. In the context of cyber defence, the state-of-the-art provides a plethora of data network collections that tend to lack presenting the information of all communic
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Hingant, Javier, Marcelo Zambrano, Francisco J. Pérez, Israel Pérez, and Manuel Esteve. "HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection." Security and Communication Networks 2018 (August 27, 2018): 1–13. http://dx.doi.org/10.1155/2018/5625860.

Повний текст джерела
Анотація:
Cyberattacks, which consist of exploiting security vulnerabilities of computer networks and systems for any kind of malicious purpose (e.g., extortion, data steal, assets hijacking), have been continuously increasing worldwide in recent years. Cyberspace appears today as a new battlefield, along with physical world scenarios (land, sea, air, and space), for the organizations defence and security. Besides, by the fact that attacks from the physical world may have significant implications in the cyber world and vice versa, these dimensions cannot be understood independently. However, the most co
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Nikoloudakis, Yannis, Ioannis Kefaloukos, Stylianos Klados, et al. "Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation." Sensors 21, no. 14 (2021): 4939. http://dx.doi.org/10.3390/s21144939.

Повний текст джерела
Анотація:
The ever-increasing number of internet-connected devices, along with the continuous evolution of cyber-attacks, in terms of volume and ingenuity, has led to a widened cyber-threat landscape, rendering infrastructures prone to malicious attacks. Towards addressing systems’ vulnerabilities and alleviating the impact of these threats, this paper presents a machine learning based situational awareness framework that detects existing and newly introduced network-enabled entities, utilizing the real-time awareness feature provided by the SDN paradigm, assesses them against known vulnerabilities, and
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Bou-Harb, Elias, Martin Husak, Mourad Debbabi, and Chadi Assi. "Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective." IEEE Transactions on Big Data 5, no. 4 (2019): 439–53. http://dx.doi.org/10.1109/tbdata.2017.2723398.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Ioannou, Georgios, Panos Louvieris, and Natalie Clewley. "A Markov Multi-Phase Transferable Belief Model for Cyber Situational Awareness." IEEE Access 7 (2019): 39305–20. http://dx.doi.org/10.1109/access.2019.2897923.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!