6,761 Hits in 4.4 sec

Early Warnings of Cyber Threats in Online Discussions [article]

Anna Sapienza, Alessandro Bessi, Saranya Damodaran, Paulo Shakarian, Kristina Lerman, Emilio Ferrara
2018 arXiv   pre-print
We introduce a system for automatically generating warnings of imminent or current cyber-threats.  ...  In a time period between September, 2016 and January, 2017, our method generated 661 alerts of which about 84% were relevant to current or imminent cyber-threats.  ...  The authors would like to thank Sindhu Kiranmai Ernala of Georgia Institute of Technology for her contribution to the paper.  ... 
arXiv:1801.09781v1 fatcat:cdhdij5c4fbf7n3kgsrm6xodaq

GARS: Real-time system for identification, assessment and control of cyber grooming attacks

Dimitrios Michalopoulos, Ioannis Mavridis, Marija Jankovic
2014 Computers & security  
The main objectives of GARS are the real-time identification, assessment and control of cyber grooming attacks in favor of child protection.  ...  The weighted sum of the particular risk values results in a total value that indicates the current cyber grooming risk the child is exposed to, as the conversation evolves.  ...  The early recognition is vital for the parent in order to follow all necessary actions to eliminate the threat before the grooming attacks becomes irreversible.  ... 
doi:10.1016/j.cose.2013.12.004 fatcat:6ds2wv6a4befrnqekgb62opdby

Operational Levels of Cyber Intelligence

Troy Mattern, John Felker, Randy Borum, George Bamford
2014 The international journal of intelligence and counter intelligence  
The hazards of cybercrime and the challenges of cybersecurity have been widely discussed over the past two decades. 2 In 2012 the security firm Norton reported alarming statistics about the growth of malicious  ...  cyber activity. 3 .  ...  While the Cyber Prep framework presents a hierarchical set of threat levels that may come from different threat vectors, levels in the Early Warning UNDERSTANDING POTENTIAL CYBER VULNERABILITY Cyber  ... 
doi:10.1080/08850607.2014.924811 fatcat:ofhxzjfufzc63lqgd62nz3bfya

A Framework for Generating Malware Threat Intelligence

Ekta Gandotra, Divya Bansal, Sanjeev Sofat
2017 Scalable Computing : Practice and Experience  
This paper purposes a design of a framework for generating Malware Threat Intelligence that can analyze, identify and predict the malware threats and can act as an Early Warning System (EWS).  ...  Secureworks [6] identifies CTI as a service, which is intended to help clients by providing them with early warnings on emerging threats, vulnerabilities and consultation with the threat intelligence group  ...  as an early warning system.  ... 
doi:10.12694/scpe.v18i3.1300 fatcat:dhrm6hm33jaz3jcdkwged4g2cu

Digital Technologies, Peacebuilding and Civil Society: Addressing Digital Conflict Drivers and Moving the Digital Peacebuilding Agenda Forward

Julia-Silvana Hofstetter, DuEPublico: Duisburg-Essen Publications Online, University Of Duisburg-Essen
2021 INEF-Report  
of action in cyberspace.  ...  the rising threat of digital conflict drivers, too.  ...  and exchange information on perceived threats. 21 Involving local voices is a crucial first step in making conflict analysis and early warning processes more inclusive.  ... 
doi:10.17185/duepublico/74328 fatcat:ftocbgk2onh5touddgswjtmwvq

The European Union's capacities for managing crises

Sarah Backman, Mark Rhinard
2017 Journal of Contingencies and Crisis Management  
This is the published version of a paper published in Journal of Contingencies and Crisis Management.  ...  Organised within the categories of detection, sense-making, decision-making, coordination, meaning-making, communication, and accountability, the data show considerable accumulation of capacities in detection  ...  Detection capacities, for instance, were operationalised as capacities focused on the timely recognition of an emerging threat, including activities on threat monitoring, horizon scanning, and early warning  ... 
doi:10.1111/1468-5973.12190 fatcat:uq77en273vcppesxkx4gqtxj7m

A Public-Private-Partnership Model for National Cyber Situational Awareness

Timea Pahi, Florian Skopik
2016 International Journal on Cyber Situational Awareness  
The gained situational awareness facilitates identifying and responding to cyber threats, enhances the security of essential infrastructures, increases the resistance of critical services for the society  ...  The P3CSA framework offers concepts and methodologies for a multi-level data collection, swift cross-organizational information sharing processes, proper cross-domain incident communication, an early warning  ...  of the projects "Cyber Incident Information Sharing" and "Cyber Incident Situational Awareness".  ... 
doi:10.22619/ijcsa.2016.100102 fatcat:xt4gkw4xenbphd2whwopdxaoyy

System Trespasser Behavior After Exposure To Warning Messages At A Chinese Computer Network: An Examination

Christian J. Howell, David Maimon, John K. Cochran, Hattie M. Jones, Ráchael A. Powers
2017 Zenodo  
Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory.  ...  The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to three warning messages.  ...  (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3).  ... 
doi:10.5281/zenodo.495772 fatcat:pnceg4hkx5djtflao4kq2znmay

War Gamesredux? Cyberthreats, US–Russian strategic stability, and new challenges for nuclear security and arms control

Andrew Futter
2015 European Security  
In this way, while indirect outsider interference (such as spoofing early warning) is likely to be manageable in times of stability and peace, in crisis situations, "cyber terrorists" would only need their  ...  Purported U.S. plans to target enemy air defence networks and warning sensors with cyber attacks early on in any future conflict are not helping assuage this concern. 21 A worst-case scenario is that Russian  ... 
doi:10.1080/09662839.2015.1112276 fatcat:k2ugvocs7fbm3bap6ksuagzhwu

Risk Management related to Privacy Policies of an Online Store

George Cristian Schin
2016 Risk in Contemporary Economy  
This paper seeks to explore the early warning alerts that NORSE system proposes to e-commerce merchants.  ...  The fight against cyber-criminality should be reinforced globally, in the attempt to mitigate the risks and losses determined by attackers.  ...  International Conference "Risk in Contemporary Economy" ISSN-L 2067-0532 ISSN online 2344-5386 XVII th Edition, 2016, Galati, Romania, "Dunarea de Jos" University of Galati -Faculty of Economics and Business  ... 
doaj:88c30ab5fd1e4c009a241701ade26f4f fatcat:syviz7544vajpcz3vila4dmwoa

Intelligent Network-Based Early Warning Systems [chapter]

Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
2006 Lecture Notes in Computer Science  
In this paper we present an approach for an agent-based early warning system (A-EWS) for critical infrastructures.  ...  In our approach we combine existing security infrastructures, e.g. firewalls or intrusion detection systems, with new detection approaches to create a global view and to determine the current threat state  ...  Christian Scheel, Stephan Schmidt, Tuvshintur Tserendorj, Robert Wetzker, Volker Eckert, Sebastian Linkiewicz, Thorsten Rimkus, Aubrey-Derrick Schmidt and Tansu Alpcan for supporting them during the creation of  ... 
doi:10.1007/11962977_9 fatcat:y4kb5j5bkfhsxkzakzr6per7uq


Mr. Naveen Kumar
2021 International journal of social science and economic research  
specific online threats.  ...  Although not much is known about the actual prevalence of cyberbullying, online sexual abuse and exploitation, cyber extremism, cyber addiction and other risks and threats for children, it is evident that  ... 
doi:10.46609/ijsser.2021.v06i04.014 fatcat:lrsv5bhzfngivk4olmasd6f7xy

Relevance of Cybersecurity Education at Pedagogy Levels in Schools

Eric Amankwa
2021 Journal of Information Security  
Therefore, there is a need to create awareness and training on cybersecurity in schools to protect students from cyber-bullying, online fraud, and being targets of prejudice.  ...  Over the recent years, cases of online fraud, cyber-bullying, racial abuse, gambling, and pornography have increased due to the lack of self-control and overall awareness among internet users.  ...  This project has helped me understand the importance and implications of promoting cybersecurity awareness in learning institutions.  ... 
doi:10.4236/jis.2021.124013 fatcat:tnta2ja4dvfpzepj75w2ggmhli

Identification of Positive Clandestine Intelligence Threats In Cyber Terrorism For National Security

Yudha Fernando, Mohammad Amin Soetomo
2021 ACMIT Proceedings  
Researchers try to identify the threat of Positive Clandestin Intelligence (PCI) in the form of cyber terrorism on national security, so that it can bring stakeholders to a better level of knowledge.  ...  This study succeeded in identifying the types of PCI CT targets, forms of PCI CT attacks, psychological motivations of PCI CT perpetrators and the position of PCI CT threats in the taxonomy of Rogers M.K  ...  of the information and facts gathered through working methods for the detection and early warning in the context of prevention, deterrence, and response to any threats to national security  ... 
doi:10.33555/acmit.v7i1.106 fatcat:5g2ikqj6hnauzg472crtxdd3pi

Literature Review of Scientific Articles about Cyber Information Sharing

Simola Jussi
2021 Zenodo  
The literature review will comprise a new database for the Echo Early Warning System (E-EWS) concept.  ...  This literature review presents a review of cyber information sharing based on systematic queries in four scientific databases. Hundreds of articles were handled and clustered.  ...  ); 2) the need to engage participants in the values of the western world (Tidey, Gill & Parrock 2020); and 3) the possibility of combining some elements of the Cyber Threat Warning System to NATO Cyber  ... 
doi:10.5281/zenodo.5566702 fatcat:3m2z5hc4hna2bab2b5jmp22cgy
« Previous Showing results 1 — 15 out of 6,761 results