Latest Publications on Cybersecurity
This is our latest selection of worldwide publications on Cybersecurity, between many scientific online journals, classified and focused on cybersecurity, malware, phishing, firewall, encryption, zero-day exploit, denial of service, data breach and threat intelligence.
Tip: Further to this selection on Cybersecurity, you can search and filter our > publication database < by author, topic, keywords, date or journal.
Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector
On 2025-02-04 by Harjinder Singh Lallie, Andrew Thompson, Elzbieta Titis, Paul Stephens @MDPI
Abstract: Universities hold and process vast amounts of financial, user, and research data, which makes them prime targets for cybercriminals. In addition to the usual external threat actors, universities face a unique insider threat from students, who&mdash;alongside staff&mdash;may lack adequate cyber security training despite having access to various sensitive systems. This paper provides a focused assessment of the current cyber security threats facing UK universities, based on a compr[...]
AI summary: Universities are prime targets for cybercriminals due to vast amounts of sensitive data. Analysis of cyber security threats facing UK universities shows limited disclosure of attack details and reliance on third-party service providers. Despite a decline in SQL injection attacks, ransomware and phishing attacks remain prevalent, exacerbated by insider threats from students. Universities should refine their cyber security strategies by developing targeted policies, strengthening training, and implementing international standards.
Cyber Attacks, Cyber Security, Vulnerabilities, Universities, Insider Threats
Publication
Hypercomplex Numbers—A Tool for Enhanced Efficiency and Intelligence in Digital Signal Processing
On 2025-02-03 by Zlatka Valkova-Jarvis, Maria Nenova, Dimitriya Mihaylova @MDPI
Abstract: Mathematics is the wide-ranging solid foundation of the engineering sciences which ensures their progress by providing them with its unique toolkit of rules, methods, algorithms and numerical systems. In this paper, an overview of the numerical systems that have currently found an application in engineering science and practice is offered, while also mentioning those systems that still await full and comprehensive applicability, recognition, and acknowledgment. Two possible approaches for repres[...]
AI summary: Overview of numerical systems in engineering science, proposing approaches for hypercomplex numbers representation, importance of understanding hypercomplex numbers, potential of hypercomplex DSP.
hypercomplex numbers, digital signal processing, engineering sciences, numerical systems, information and communication technologies
Publication
Tailored Protocols for Periodic and Remote Control Traffic Patterns
On 2025-02-02 by Shunfang Hu, Yuanyuan Zhang, Yanru Guo, Yanru Chen, Liangyin Chen @MDPI
Abstract: IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. While AKA protocols for these applications have been extensively studied, achieving anonymity remains a challenge. AKA schemes using one-time pseudonyms face resynchronization issues after desynchronization attacks, and the high computational overhead of bilinear pairing and public key encryption limits [...]
AI summary: Tailored protocols address challenges in achieving anonymity for IoT-based applications, improving security features and reducing communication costs while minimizing computational overhead. Resynchronization issues and vulnerability to attacks are mitigated through PUAKA and RCAKA schemes, offering enhanced security and efficiency.
protocols, IoT-based applications, anonymous authentication, key agreement, periodic control pattern
Publication
Wazuh Security Event Response with Retrieval-Augmented-Generation-Driven Copilot
On 2025-01-31 by Ismail, Rahmat Kurnia, Farid Widyatama, Ilham Mirwansyah Wibawa, Zilmas Arjuna Brata, Ukasyah, Ghitha Afina Nelistiani, Howon Kim @MDPI
Abstract: The sophistication of cyberthreats demands more efficient and intelligent tools to support Security Operations Centers (SOCs) in managing and mitigating incidents. To address this, we developed the Security Event Response Copilot (SERC), a system designed to assist analysts in responding to and mitigating security breaches more effectively. SERC integrates two core components: (1) security event data extraction using Retrieval-Augmented Generation (RAG) methods, and (2) LLM-based incident respon[...]
AI summary: Cyberthreat sophistication requires efficient tools. SERC assists analysts in responding to breaches. Wazuh integrates RAG methods for data extraction. Combining threat intelligence frameworks with AI-driven models is essential.
Wazuh, Security Event Response, Retrieval-Augmented-Generation-Driven, Copilot, SIEM
Publication
Threat Analysis and Risk Assessment (TARA) Analysis of an Autonomous Emergency Braking (AEB) System
On 2025-01-29 by Umberto Della Monica, Kimberly-Annalena Munjal, Mark Paul Tamas, Biagio Boi, Christian Esposito, Rahamatullah Khondoker @MDPI
Abstract: To ensure security and stable quality, deeper cybersecurity evaluations are essential for the development of safety features and functionalities in vehicles. Among these, the Autonomous emergency braking (AEB) system is the most relevant. This research presents a comprehensive Threat analysis and risk assessment (TARA) of the AEB system, emphasizing the identification, validation, and mitigation of major cybersecurity threats and risks. We systematically examine potential attack vectors by utili[...]
AI summary: Comprehensive TARA analysis of AEB system, using STRIDE threat model. Assessment aligns with industry standards, identifies critical flaws, proposes corrective measures. Structured methodology for automotive cybersecurity risk mitigation. Safe implementation of AEB technology to improve vehicle security.
cybersecurity, risk assessment, autonomous emergency braking system, threat analysis, ISO/SAE 21434
Publication
Evidence from the Financial Sector of a Developing Country
On 2025-01-27 by Adeel Ali, Mahmood Shah, Monika Foster, Mansour Naser Alraja @MDPI
Abstract: Technological advancements have helped all sectors to evolve. This advancement has widened the cyberspace and attack surface, which has led to a drastic increase in cyberattacks. Cybersecurity solutions have also evolved. The advancement is relatively slower in developing countries. However, the financial sector in developing countries has shown resistance to cyberattacks. This paper investigates the reasons for this resistance. Despite using legacy systems, the banking sector in Pakistan has de[...]
AI summary: Evidence from the Financial Sector of a Developing Country shows resistance to cyberattacks in the banking sector of Pakistan, attributed to lower attack surface and opportunity cost of cyberattacks. The research advocates for the adoption of advanced technologies like AI and ML for cybersecurity in developing countries.
cybersecurity, financial sector, developing country, resistance, technological advancements
Publication
¿De cuánta utilidad te ha parecido este contenido?
¡Haz clic en una estrella para puntuarlo!
Promedio de puntuación 0 / 5. Recuento de votos: 0
Hasta ahora, ¡no hay votos!. Sé el primero en puntuar este contenido.
¡Siento que este contenido no te haya sido útil!
¡Déjame mejorar este contenido!
Dime, ¿cómo puedo mejorar este contenido?