UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 52.200
1.
  • Pattern differentiation and... Pattern differentiation and tuning shift in human sensory cortex underlie long-term threat memory
    You, Yuqi; Novak, Lucas R.; Clancy, Kevin J. ... Current biology, 05/2022, Letnik: 32, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    The amygdala-prefrontal-cortex circuit has long occupied the center of the threat system,1 but new evidence has rapidly amassed to implicate threat processing outside this canonical circuit.2–4 ...
Celotno besedilo
2.
  • SCERM—A novel framework for... SCERM—A novel framework for automated management of cyber threat response activities
    Iqbal, Zafar; Anwar, Zahid Future generation computer systems, July 2020, 2020-07-00, Letnik: 108
    Journal Article
    Recenzirano

    Cyber Threat Management (CTM) involves prevention, detection, and response to cyber-attacks by identifying and understanding threats, and applying appropriate actions. This is not practical for an ...
Celotno besedilo
3.
  • Insight Into Insiders and IT Insight Into Insiders and IT
    Homoliak, Ivan; Toffalini, Flavio; Guarnizo, Juan ... ACM computing surveys, 05/2019, Letnik: 52, Številka: 2
    Journal Article
    Recenzirano

    Insider threats are one of today’s most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural taxonomy and novel ...
Celotno besedilo

PDF
4.
  • A Survey on Threat Hunting ... A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr; Pourzandi, Makan; Debbabi, Mourad IEEE Communications surveys and tutorials, 10/2023, Letnik: 25, Številka: 4
    Journal Article
    Recenzirano

    With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation ...
Celotno besedilo
5.
  • Advanced Persistent Threat ... Advanced Persistent Threat intelligent profiling technique: A survey
    Tang, BinHui; Wang, JunFeng; Yu, Zhongkun ... Computers & electrical engineering, October 2022, 2022-10-00, Letnik: 103
    Journal Article
    Recenzirano

    With the boom in Internet and information technology, cyber-attacks are becoming more frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike traditional attacks, APT ...
Celotno besedilo
6.
  • A machine learning-based Fi... A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
    Noor, Umara; Anwar, Zahid; Amjad, Tehmina ... Future generation computer systems, July 2019, 2019-07-00, Letnik: 96
    Journal Article
    Recenzirano

    Cyber threat attribution identifies the source of a malicious cyber activity, which in turn informs cyber security mitigation responses and strategies. Such responses and strategies are crucial for ...
Celotno besedilo
7.
  • Perceived threat or perceiv... Perceived threat or perceived benefit? Immigrants’ perception of how Finns tend to perceive them
    Nshom, Elvis; Khalimzoda, Ilkhom; Sadaf, Shomaila ... International journal of intercultural relations, January 2022, 2022-01-00, 20220101, Letnik: 86
    Journal Article
    Recenzirano
    Odprti dostop

    Research on how immigrants are perceived by locals has flourished extensively within the past decades. Through the lens of integrated threat theory and the threat benefit model, this study examines ...
Celotno besedilo

PDF
8.
Celotno besedilo

PDF
9.
  • Threat modeling – A systema... Threat modeling – A systematic literature review
    Xiong, Wenjun; Lagerström, Robert Computers & security, 07/2019, Letnik: 84
    Journal Article
    Recenzirano
    Odprti dostop

    Cyber security is attracting worldwide attention. With attacks being more and more common and often successful, no one is spared today. Threat modeling is proposed as a solution for secure ...
Celotno besedilo
10.
  • P2TIF: A Blockchain and Dee... P2TIF: A Blockchain and Deep Learning Framework for Privacy-preserved Threat Intelligence in Industrial IoT
    Kumar, Prabhat; Kumar, Randhir; Gupta, Govind P. ... IEEE transactions on industrial informatics, 09/2022, Letnik: 18, Številka: 9
    Journal Article

    Industrial Internet of Things (IIoT) refers connecting sensing and actuating devices ubiquitously with Internet. Due to interconnection between different Internet-enabled objects around the globe, ...
Celotno besedilo
1 2 3 4 5
zadetkov: 52.200

Nalaganje filtrov