期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Cyber Resilience through Real-Time Threat Analysis in Information Security
1
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 cybersecurity Information Security Network Security cyber resilience Real-Time Threat Analysis cyber Threats cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics cyberCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Actual TDoA-based augmentation system for enhancing cybersecurity in ADS-B
2
作者 Ahmed AbdelWahab ELMARADY Kamel RAHOUMA 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第2期217-228,共12页
Currently, cybersecurity and cyber resilience are emerging and urgent issues in nextgeneration air traffic surveillance systems, which depend primarily on Automatic Dependent Surveillance-Broadcast(ADS-B) owing to its... Currently, cybersecurity and cyber resilience are emerging and urgent issues in nextgeneration air traffic surveillance systems, which depend primarily on Automatic Dependent Surveillance-Broadcast(ADS-B) owing to its low cost and high accuracy. Unfortunately, ADS-B is prone to cyber-attacks. To verify the ADS-B positioning data of aircraft, multilateration(MLAT)techniques that use Time Differences of Arrivals(TDoAs) have been proposed. MLAT exhibits low accuracy in determining aircraft positions. Recently, a novel technique using a theoretically calculated TDoA fingerprint map has been proposed. This technique is less dependent on the geometry of sensor deployment and achieves better accuracy than MLAT. However, the accuracy of the existing technique is not sufficiently precise for determining aircraft positions and requires a long computation time. In contrast, this paper presents a reliable surveillance framework using an Actual TDoA-Based Augmentation System(ATBAS). It uses historically recorded real-data from the OpenSky network to train our TDoA fingerprint grid network. Our results show that the accuracy of the proposed ATBAS framework in determining the aircraft positions is significantly better than those of the MLAT and expected TDoA techniques by 56.93% and 48.86%, respectively. Additionally, the proposed framework reduced the computation time by 77% compared with the expected TDoA technique. 展开更多
关键词 ADS-B cyberSECURITY cyber resilience k-Nearest Neighbors(k-NN)classifier Machine learning Multilateration
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部