INTERNET securityBIG dataTECHNOLOGICAL innovationsIn an effort to examine the spread of large-scale cyber attacks, researchers have created various taxonomies. These taxonomies are purposefully built to facilitate the understanding and the comparison of these attacks, and hence counter their ...
An attack taxonomy offers a consistent and structured classification scheme to systematically understand, identify, and classify cybersecurity threat attributes. However, existing taxonomies only focus on a narrow range of attacks and limited threat attributes, lacking a comprehensive characterization of manuf...
To close this gap, we develop a new taxonomy of the most common cybersecurity training delivery methods and compare them along various factors. The work reported in this paper is useful for various stakeholders. For organizations conducting or considering phishing training, it helps them understand ...
DFRLab-dichotomies-of-disinformation : DFRLab Dichotomies of Disinformation. OverviewDMLDML : The Detection Maturity Level (DML) model is a capability maturity model for referencing ones maturity in detecting cyber attacks. It's designed for organizations who perform intel-driven detection and response...
The CERT paper should include a taxonomy of risks to various asset classes that can be impacted by cyber attack for example government, infrastructure, public, private, etc. Of course, the main missing information is concrete material on prevention and mitigation. ...
With the rapid growth of data volumes in real-world applications, anomaly detection has become a crucial task across various scenarios. Anomalies are generally defined as data points that constitute a small proportion yet exhibit significantly different patterns. Numerous detection methods have been propo...
the limitations of current attacks and defense approaches and provide an outlook on promising future research directions in FL. Introduction As smart cities grow in popularity, the amounts of multi-source heterogeneous data generated by various organizations and individuals have become increasingly diverse...
In order to obtain a more robust MANET operation through innovative design and development strategies, the study of severity of various attacks and their respective counter measures is necessary. This paper presents a detailed survey of TCP/IP layerwise attacks on MANET and the corresponding defence...
Layered security is an effective risk management strategy. It mitigates the risks that a threat becomes a reality with several protections from different layers or of various types. The idea has become prevalent for securing information systems after it has been introduced by the Department of Defens...
Android is nowadays the most popular operating system in the world, not only in the realm of mobile devices, but also when considering desktop and laptop computers. Such a popularity makes it an attractive target for security attacks, also due to the sensitive information often manipulated by mob...