A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Early Warnings of Cyber Threats in Online Discussions
[article]
2018
arXiv
pre-print
We introduce a system for automatically generating warnings of imminent or current cyber-threats. ...
In a time period between September, 2016 and January, 2017, our method generated 661 alerts of which about 84% were relevant to current or imminent cyber-threats. ...
The authors would like to thank Sindhu Kiranmai Ernala of Georgia Institute of Technology for her contribution to the paper. ...
arXiv:1801.09781v1
fatcat:cdhdij5c4fbf7n3kgsrm6xodaq
GARS: Real-time system for identification, assessment and control of cyber grooming attacks
2014
Computers & security
The main objectives of GARS are the real-time identification, assessment and control of cyber grooming attacks in favor of child protection. ...
The weighted sum of the particular risk values results in a total value that indicates the current cyber grooming risk the child is exposed to, as the conversation evolves. ...
The early recognition is vital for the parent in order to follow all necessary actions to eliminate the threat before the grooming attacks becomes irreversible. ...
doi:10.1016/j.cose.2013.12.004
fatcat:6ds2wv6a4befrnqekgb62opdby
Operational Levels of Cyber Intelligence
2014
The international journal of intelligence and counter intelligence
The hazards of cybercrime and the challenges of cybersecurity have been widely discussed over the past two decades. 2 In 2012 the security firm Norton reported alarming statistics about the growth of malicious ...
cyber activity. 3 . ...
While the Cyber Prep framework presents a hierarchical set of threat levels that may come from different threat vectors, levels in the Early Warning
UNDERSTANDING POTENTIAL CYBER VULNERABILITY Cyber ...
doi:10.1080/08850607.2014.924811
fatcat:ofhxzjfufzc63lqgd62nz3bfya
A Framework for Generating Malware Threat Intelligence
2017
Scalable Computing : Practice and Experience
This paper purposes a design of a framework for generating Malware Threat Intelligence that can analyze, identify and predict the malware threats and can act as an Early Warning System (EWS). ...
Secureworks [6] identifies CTI as a service, which is intended to help clients by providing them with early warnings on emerging threats, vulnerabilities and consultation with the threat intelligence group ...
as an early warning system. ...
doi:10.12694/scpe.v18i3.1300
fatcat:dhrm6hm33jaz3jcdkwged4g2cu
Digital Technologies, Peacebuilding and Civil Society: Addressing Digital Conflict Drivers and Moving the Digital Peacebuilding Agenda Forward
2021
INEF-Report
of action in cyberspace. ...
the rising threat of digital conflict drivers, too. ...
and exchange information on perceived threats. 21 Involving local voices is a crucial first step in making conflict analysis and early warning processes more inclusive. ...
doi:10.17185/duepublico/74328
fatcat:ftocbgk2onh5touddgswjtmwvq
The European Union's capacities for managing crises
2017
Journal of Contingencies and Crisis Management
This is the published version of a paper published in Journal of Contingencies and Crisis Management. ...
Organised within the categories of detection, sense-making, decision-making, coordination, meaning-making, communication, and accountability, the data show considerable accumulation of capacities in detection ...
Detection capacities, for instance, were operationalised as capacities focused on the timely recognition of an emerging threat, including activities on threat monitoring, horizon scanning, and early warning ...
doi:10.1111/1468-5973.12190
fatcat:uq77en273vcppesxkx4gqtxj7m
A Public-Private-Partnership Model for National Cyber Situational Awareness
2016
International Journal on Cyber Situational Awareness
The gained situational awareness facilitates identifying and responding to cyber threats, enhances the security of essential infrastructures, increases the resistance of critical services for the society ...
The P3CSA framework offers concepts and methodologies for a multi-level data collection, swift cross-organizational information sharing processes, proper cross-domain incident communication, an early warning ...
of the projects "Cyber Incident Information Sharing" and "Cyber Incident Situational Awareness". ...
doi:10.22619/ijcsa.2016.100102
fatcat:xt4gkw4xenbphd2whwopdxaoyy
System Trespasser Behavior After Exposure To Warning Messages At A Chinese Computer Network: An Examination
2017
Zenodo
Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory. ...
The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to three warning messages. ...
(warning 1), a
legal sanction threat (warning 2), and an ambiguous threat (warning 3). ...
doi:10.5281/zenodo.495772
fatcat:pnceg4hkx5djtflao4kq2znmay
War Gamesredux? Cyberthreats, US–Russian strategic stability, and new challenges for nuclear security and arms control
2015
European Security
In this way, while indirect outsider interference (such as spoofing early warning) is likely to be manageable in times of stability and peace, in crisis situations, "cyber terrorists" would only need their ...
Purported U.S. plans to target enemy air defence networks and warning sensors with cyber attacks early on in any future conflict are not helping assuage this concern. 21 A worst-case scenario is that Russian ...
doi:10.1080/09662839.2015.1112276
fatcat:k2ugvocs7fbm3bap6ksuagzhwu
Risk Management related to Privacy Policies of an Online Store
2016
Risk in Contemporary Economy
This paper seeks to explore the early warning alerts that NORSE system proposes to e-commerce merchants. ...
The fight against cyber-criminality should be reinforced globally, in the attempt to mitigate the risks and losses determined by attackers. ...
International Conference "Risk in Contemporary Economy" ISSN-L 2067-0532 ISSN online 2344-5386 XVII th Edition, 2016, Galati, Romania, "Dunarea de Jos" University of Galati -Faculty of Economics and Business ...
doaj:88c30ab5fd1e4c009a241701ade26f4f
fatcat:syviz7544vajpcz3vila4dmwoa
Intelligent Network-Based Early Warning Systems
[chapter]
2006
Lecture Notes in Computer Science
In this paper we present an approach for an agent-based early warning system (A-EWS) for critical infrastructures. ...
In our approach we combine existing security infrastructures, e.g. firewalls or intrusion detection systems, with new detection approaches to create a global view and to determine the current threat state ...
Christian Scheel, Stephan Schmidt, Tuvshintur Tserendorj, Robert Wetzker, Volker Eckert, Sebastian Linkiewicz, Thorsten Rimkus, Aubrey-Derrick Schmidt and Tansu Alpcan for supporting them during the creation of ...
doi:10.1007/11962977_9
fatcat:y4kb5j5bkfhsxkzakzr6per7uq
CHILDREN AND CYBER CRIMES
2021
International journal of social science and economic research
specific online threats. ...
Although not much is known about the actual prevalence of cyberbullying, online sexual abuse and exploitation, cyber extremism, cyber addiction and other risks and threats for children, it is evident that ...
doi:10.46609/ijsser.2021.v06i04.014
fatcat:lrsv5bhzfngivk4olmasd6f7xy
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
2021
Journal of Information Security
Therefore, there is a need to create awareness and training on cybersecurity in schools to protect students from cyber-bullying, online fraud, and being targets of prejudice. ...
Over the recent years, cases of online fraud, cyber-bullying, racial abuse, gambling, and pornography have increased due to the lack of self-control and overall awareness among internet users. ...
This project has helped me understand the importance and implications of promoting cybersecurity awareness in learning institutions. ...
doi:10.4236/jis.2021.124013
fatcat:tnta2ja4dvfpzepj75w2ggmhli
Identification of Positive Clandestine Intelligence Threats In Cyber Terrorism For National Security
2021
ACMIT Proceedings
Researchers try to identify the threat of Positive Clandestin Intelligence (PCI) in the form of cyber terrorism on national security, so that it can bring stakeholders to a better level of knowledge. ...
This study succeeded in identifying the types of PCI CT targets, forms of PCI CT attacks, psychological motivations of PCI CT perpetrators and the position of PCI CT threats in the taxonomy of Rogers M.K ...
of the information and facts gathered through working methods for the detection and early warning in the context of prevention, deterrence, and response to any threats to national security ...
doi:10.33555/acmit.v7i1.106
fatcat:5g2ikqj6hnauzg472crtxdd3pi
Literature Review of Scientific Articles about Cyber Information Sharing
2021
Zenodo
The literature review will comprise a new database for the Echo Early Warning System (E-EWS) concept. ...
This literature review presents a review of cyber information sharing based on systematic queries in four scientific databases. Hundreds of articles were handled and clustered. ...
); 2) the need to engage participants in the values of the western world (Tidey, Gill & Parrock 2020); and 3) the possibility of combining some elements of the Cyber Threat Warning System to NATO Cyber ...
doi:10.5281/zenodo.5566702
fatcat:3m2z5hc4hna2bab2b5jmp22cgy
« Previous
Showing results 1 — 15 out of 6,761 results